AZURE / Network Security Groups / Open MySQL
|Plugin Title||Open MySQL|
|Category||Network Security Groups|
|Description||Determine if TCP port 4333 or 3306 for MySQL is open to the public|
|More Info||While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as MySQL should be restricted to known IP addresses.|
|Recommended Action||Restrict TCP ports 4333 and 3306 to known IP addresses|
Detailed Remediation Steps
- Log into the Microsoft Azure Management Console.
- Select the "Search resources, services, and docs" option at the top and search for Network security groups.
- Select the "Network security group" that needs to be verified.
- Click on the "Name" of the selected "Network security group" to access the port configurations.
- In the "Overview" tab scroll down the page and check the "Inbound security rules."
- If the "MySQL" for port 4333 or 3306 with the protocol "TCP" is showing as "Allow" for all "Source" and "Destination" then the selected "Network security group" has TCP port 4333 or 3306 for MySQL is open to the public.
- Repeat steps number 2 - 6 to verify other "Network security group."
- Navigate to the "Network security group" and select the security group that needs to modify for restricting the "TCP" port for "MySQL" on port 4333 or 3306 to specific IP Address.
- Scroll down the left navigation panel and choose "Inbound security rules" under "Settings."
- Click on the "MySQL" protocol in the "Name" column and under "Source" select the "IP Address" from the dropdown menu and enter the "Source IP addresses/CIDR ranges" as per the requirement and click on the "Save" option at the top panel.
- Repeat steps number 8 - 10 to restrict TCP port 4333 or 3306 for MySQL to known IP addresses.