More Info:

Ensure that your Microsoft Azure Cosmos DB accounts are configured to deny access to traffic from all networks, including the public Internet. By restricting the public access to your Azure Cosmos accounts, you add an additional layer of security to the account resources, as the default action is to accept requests from any source. To limit access to trusted networks and/or IP addresses only, you must update the firewall and the virtual network configuration for your Cosmos DB accounts.

Risk Level

Medium

Address

Security

Compliance Standards

Triage and Remediation

Remediation

To remediate the misconfiguration “Restrict Default Network Access for Azure Cosmos DB Accounts” in Azure using the Azure console, follow these steps:

  1. Log in to the Azure portal (https://portal.azure.com/).

  2. Navigate to the Azure Cosmos DB account for which you want to restrict network access.

  3. Click on the “Firewalls and virtual networks” tab.

  4. Under the “Firewall” section, select “Enabled”.

  5. Under the “Virtual networks” section, select the virtual network that you want to allow access to.

  6. Under the “Subnets” section, select the subnet that you want to allow access to.

  7. Click on “Save” to apply the changes.

By following these steps, you have successfully remediated the misconfiguration “Restrict Default Network Access for Azure Cosmos DB Accounts” in Azure using the Azure console.