5.1.7 Ensure Public Network Access is Disabled

Information

Disabling public network access restricts the service from accessing public networks.

Rationale:

A secure network architecture requires carefully constructed network segmentation. Public Network Access tends to be overly permissive and introduces unintended vectors for threat activity.

Impact:

Some architectural consideration may be necessary to ensure that required network connectivity is still made available. No additional cost or performance impact is required to deploy this recommendation.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From Azure Portal

Go to SQL servers.

For each SQL server, under Security, click Networking.

Set Public network access to Disable.

Click Save.

Default Value:

By default, Azure SQL Server's Public network access is set to Disable.

See Also

https://workbench.cisecurity.org/benchmarks/16820

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CA-9, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.4

Plugin: microsoft_azure

Control ID: 90468a173e9283570b3966502d0fed7cbef326a815c195ed6822453ab0051f26