Ensure that your Microsoft Azure Container Apps are not configured to allow insecure HTTP traffic (port 80) to prevent data interception and unauthorized access. Enforcing HTTPS for endpoint access helps protect sensitive data and maintain secure communications.
Allowing Microsoft Azure Container Apps to accept insecure network traffic (HTTP port 80) can expose sensitive data to interception and compromise, as HTTP does not encrypt data in transit. This creates vulnerabilities for Man-in-The-Middle (MITM) attacks, where attackers can intercept or alter data. Routing ingress traffic through HTTPS (port 443) instead of HTTP (port 80) enables encryption, ensuring data integrity and privacy. Enforcing HTTPS also helps maintain compliance with industry security standards and protects users' sensitive information.
Audit
To determine if your Azure Container Apps are configured to allow insecure connections, perform the following operations:
Remediation / Resolution
To ensure that your Microsoft Azure Container Apps are not configured to allow insecure HTTP traffic (port 80), perform the following operations:
References
- Azure Official Documentation
- Networking in Azure Container Apps environment
- Ingress in Azure Container Apps
- Configure Ingress for your app in Azure Container Apps
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az containerapp list
- az containerapp show
- az containerapp ingress update