Ensure that the databases managed with Azure Database for PostgreSQL have the Transport Encryption feature enabled in order to meet security and compliance requirements. Transport Encryption is the security feature that forces all connections to your database servers to use TLS/SSL. Once enabled, the data transport encryption and decryption is handled transparently and does not require any additional action from you or your application.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
According to HIPAA compliance, all connections made to Azure Database for PostgreSQL servers that process, store, and transmit PHI (Protected Health Information) must use encryption provided by the Transport Encryption feature. In Azure cloud, Transport Encryption implements encryption in transit using the require_secure_transport server parameter for PostgreSQL databases. Enforcing TLS/SSL connections between PostgreSQL database server and client applications also helps protect against Man-in-The-Middle (MITM) attacks by encrypting the data stream between the server and applications.
Audit
To determine if the Transport Encryption feature is enabled for your Azure PostgreSQL flexible database servers, perform the following operations:
Remediation / Resolution
To enable the Transport Encryption feature for your Azure PostgreSQL flexible database servers, perform the following operations:
References
- Azure Official Documentation
- Secure connectivity with TLS and SSL in Azure Database for PostgreSQL - Flexible Server
- Encrypted connectivity using TLS/SSL
- Security Control: Data protection
- Azure Command Line Interface (CLI) Documentation
- az postgres flexible-server list
- az postgres flexible-server parameter show
- az postgres flexible-server parameter set