Ensure that your Microsoft Azure network security groups (NSGs) allow inbound/ingress access on TCP port 5432 to trusted IP addresses only, in order to implement the principle of least privilege and greatly reduce the attack surface. TCP port 5432 is used by the PostgreSQL Database Server, an object-relational database management system (RDBMS) server developed by PostgreSQL Global Development Group.
This rule resolution is part of the Cloud Conformity Security & Compliance tool for Azure
Allowing unrestricted access on TCP port 5432 (PostgreSQL Database) via Azure network security groups (NSGs) can increase opportunities for malicious activities such as brute force attacks, DDoS and SQL injection attacks.
To determine if your Microsoft Azure network security groups allow unrestricted access on TCP port 5432, perform the following actions:
Remediation / Resolution
To reconfigure your Azure NSG rules in order to allow access on TCP port 5432 to trusted entities such as administrator IP addresses or IP ranges, perform the following actions:
Unlock the Remediation Steps
Gain free unlimited access
to our full Knowledge Base
Over 750 rules & best practices
You are auditing:
Check for Unrestricted PostgreSQL Database Access
Risk level: High