Skip to content

Commit d512cea

Browse files
Merge pull request #2672 from CESANU/docs-editor/recommendations-reference-data-1774770384
Update recommendations-reference-data.md
2 parents 0bb8fef + 2ecb4b9 commit d512cea

1 file changed

Lines changed: 22 additions & 0 deletions

File tree

articles/defender-for-cloud/recommendations-reference-data.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1925,6 +1925,28 @@ Even with key owner precautions, keys can be easily leaked by less than optimum
19251925

19261926
**Severity**: High
19271927

1928+
### Geo-redundant backups should be enabled for PostgreSQL Servers
1929+
1930+
**Description**:
1931+
__What is geo-redundant backup?__ Geo-redundant backup replicates server backups to a paired Azure region, providing resilience against regional failures.
1932+
1933+
__Why is it a security concern?__ If geo-redundant backups are disabled, a regional outage could result in data loss and extended downtime, impacting availability and compliance.
1934+
1935+
__How could attackers exploit it or how could it lead to data breaches?__ While not directly exploitable, lack of geo-redundancy increases the impact of disasters or targeted attacks on a single region.
1936+
1937+
**Severity**: Low
1938+
1939+
### require_secure_transport should be set to “on” for Azure Database for PostgreSQL Servers
1940+
1941+
**Description**:
1942+
__What is require_secure_transport?__ require_secure_transport is a server-level parameter that enforces the use of SSL/TLS for all client connections to PostgreSQL. When set to on, clients must connect using encrypted channels.
1943+
1944+
__Why is it a security concern?__ If this setting is disabled (off), clients may connect over unencrypted channels, exposing sensitive data such as credentials, queries, and results to interception or manipulation.
1945+
1946+
__How could attackers exploit it or how could it lead to data breaches?__ An attacker on the network could perform a man-in-the-middle attack, intercepting or altering data exchanged between the client and server if encryption is not enforced.
1947+
1948+
**Severity**: High
1949+
19281950
## Related content
19291951

19301952
- [Learn about security recommendations](security-policy-concept.md)

0 commit comments

Comments
 (0)