turbot/azure_compliance

Control: 4.4.2 Ensure 'TLS Version' is set to 'TLSV1.2' for MySQL flexible Database Server

Description

TLS connectivity helps to provide a new layer of security, by connecting database server to client applications using Transport Layer Security (TLS). Enforcing TLS connections between database server and client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and application.

Remediation

From Console

  1. Login to Azure Portal
  2. Go to Azure Database for MySQL flexible servers
  3. For each database, click on Server parameters under Settings
  4. In the search box, type in tls_version
  5. Click on the VALUE dropdown, and ensure only TLSV1.2 is selected for tls_version

From Command Line

Use the below command to set MYSQL flexible databases to used version 1.2 for the tls_version parameter.

az mysql flexible-server parameter set --name tls_version --resourcegroup <resourceGroupName> --server-name <serverName> --value TLSV1.2

Usage

Run the control in your terminal:

powerpipe control run azure_compliance.control.cis_v140_4_4_2

Snapshot and share results via Turbot Pipes:

powerpipe login
powerpipe control run azure_compliance.control.cis_v140_4_4_2 --share

SQL

This control uses a named query:

mysql_server_min_tls_1_2

Tags