Skip to content

Commit 823d1f4

Browse files
committed
Learn Editor: Update recommendations-reference-data.md
1 parent b527f60 commit 823d1f4

1 file changed

Lines changed: 30 additions & 0 deletions

File tree

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1944,6 +1944,36 @@ __How could attackers exploit it or how could it lead to data breaches?__ An att
19441944

19451945
**Severity**: High
19461946

1947+
### Private endpoint should be configured for Azure Database for PostgreSQL Servers
1948+
1949+
**Description**:
1950+
1951+
__What is a private endpoint?__
1952+
1953+
A private endpoint in Azure allows resources to be accessed securely over a private IP address within a virtual network. For Azure Database for PostgreSQL servers, configuring a private endpoint ensures that database traffic does not traverse the public internet.
1954+
1955+
__Why is it a security concern?__
1956+
1957+
Without a private endpoint, the server may be exposed to public network access, increasing the risk of unauthorized access, data interception, and denial-of-service attacks.
1958+
1959+
__How could attackers exploit it or how could it lead to data breaches?__
1960+
1961+
An attacker could scan public IP ranges to discover exposed servers and attempt brute-force or exploit-based attacks. Public exposure also increases the risk of data exfiltration via compromised clients.
1962+
1963+
**Severity**: High
1964+
1965+
### 'Allow access to Azure services' should be disabled for PostgreSQL Servers
1966+
1967+
**Description**:
1968+
1969+
__What is 'Allow access to Azure services'?__ This setting creates a firewall rule that permits all Azure services to connect to the PostgreSQL server. While convenient, it introduces significant risk by allowing connections from any Azure subscription.
1970+
1971+
__Why is it a security concern?__ Enabling this setting bypasses network isolation controls, potentially exposing the database to unauthorized access from external Azure tenants.
1972+
1973+
__How could attackers exploit it or how could it lead to data breaches?__ An attacker operating from another Azure subscription could attempt brute-force attacks or exploit vulnerabilities if this rule is enabled.
1974+
1975+
**Severity**: High
1976+
19471977
## Related content
19481978

19491979
- [Learn about security recommendations](security-policy-concept.md)

0 commit comments

Comments
 (0)