More Info:

Ensure that Microsoft Azure PostgreSQL server data is encrypted in transit in order to meet security and compliance requirements. In-transit encryption helps prevent unauthorized users from getting access to critical data available in your Azure PostgreSQL databases.

Risk Level

High

Address

Security

Compliance Standards

CISAZURE, CBP, HITRUST, SOC2, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

Sure, here are the step-by-step instructions to remediate the misconfiguration of enabling in-transit encryption for PostgreSQL Database Servers in AZURE:

  1. Go to the AZURE portal and login to your account.
  2. In the left-hand menu, click on the “Azure Database for PostgreSQL servers” option.
  3. Select the PostgreSQL server for which you want to enable in-transit encryption.
  4. In the left-hand menu, under the “Security” section, click on the “Connection security” option.
  5. Under the “Connection security” section, toggle the “Enforce SSL connection” option to “Enabled”.
  6. Once you have enabled the “Enforce SSL connection” option, click on the “Save” button at the top of the page to save your changes.

That’s it! You have now remediated the misconfiguration of enabling in-transit encryption for PostgreSQL Database Servers in AZURE. Now, all connections to your PostgreSQL server will be encrypted using SSL.