Azure Db Postgresql Insecure Tls Version
Description
Detects Azure PostgreSQL databases configured with outdated TLS versions that could expose database communications to security vulnerabilities. A minimum TLS version of 1.2 is required to ensure secure encrypted connections between clients and the database server.
Detection Strategy
• Scans all PostgreSQL database servers in the Azure subscription
• Checks the 'minimal_tls_version' configuration setting for each database server
• Reports a vulnerability if the minimal TLS version is not set to TLS 1.2
• Identifies affected resources by their Azure resource ID and includes the configured TLS version in the report
Severity v4.0
0.6
Low
Method ID
CSPM-1QGCD
Technique
CSPM
Target
AZURE
Technology
DB_POSTGRESQL
CWE ID(s)
CWE-327Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.