Information
Enable require_secure_transport on PostgreSQL flexible servers.
Rationale:
SSL connectivity helps to provide a new layer of security by connecting database server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between database server and client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and application.
Solution
Remediate from Azure Portal
Login to Azure Portal using https://portal.azure.com.
Go to Azure Database for PostgreSQL flexible servers.
For each database, under Settings, click Server parameters.
In the filter bar, type require_secure_transport.
Set the VALUE for require_secure_transport to ON.
Click Save.
Remediate from Azure CLI
Use the below command to enable require_secure_transport:
az postgres flexible-server parameter set --resource-group <resourceGroup> --server-name <serverName> --name require_secure_transport --value on
Remediate from PowerShell
Update-AzPostgreSqlFlexibleServerConfiguration -ResourceGroupName <resourceGroup> -ServerName <serverName> -Name require_secure_transport -Value on
Default Value:
By default, secure connectivity is enforced, but some application frameworks may not enable it during deployment.