HIGH
Source
CloudSploit
ID
open-sqlserver

Open SQLServer

Determine if TCP port 1433 or UDP port 1434 for SQL Server is open to the public

While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as SQL server should be restricted to known IP addresses.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the Microsoft Azure Management Console.

  2. Click the search bar at the top and search for Network security groups. Step

  3. Select the “Network security group” that needs to be verified. Step

  4. Click on the “Name” of the selected “Network security group” to access the port configurations. Step

  5. In the “Overview” tab scroll down the page and check the “Inbound security rules” under the “Settings”. Step

  6. If the “SQL Server” for port 1433/1434 with the protocol “TCP/UDP” is showing as “Allow” under “Action” column for all “Source” and “Destination” then the selected “Network security group” has TCP/UDP port 1433/1434 for “SQL Server” open to the public.

  7. Repeat step number 2 - 6 to verify other “Network security groups”.

  8. Navigate to the “Network security group” and select the security group that needs to be modified for restricting the “TCP/UDP” port for “SQL Server” on port 1433/1434 to specific IP Address.

  9. Scroll down the left navigation panel and choose “Inbound security rules” under “Settings."

  10. Click on the “SQL Server” protocol in the “Name” column and in the right pane under “Source” select the “IP Address” from the dropdown menu and enter the “Source IP addresses/CIDR ranges” as per the requirement, select the required “Protocol” and “Action” and click on the “Save” option at the top of the pane.

  11. Repeat step number 8 - 10 to restrict TCP port 1433 and UDP port 1434 to known IP addresses.