4.5.1 Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Limiting your Cosmos DB to only communicate on whitelisted networks lowers its attack footprint.

Rationale:

Selecting certain networks for your Cosmos DB to communicate restricts the number of networks including the internet that can interact with what is stored within the database.

Impact:

Failure to whitelist the correct networks will result in a connection loss.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From Azure Portal

Open the portal menu.

Select the Azure Cosmos DB blade.

Select a Cosmos DB account to audit.

Select Networking.

Under Public network access, select Selected networks.

Under Virtual networks, select + Add existing virtual network or + Add a new virtual network.

For existing networks, select subscription, virtual network, subnet and click Add. For new networks, provide a name, update the default values if required, and click Create.

Click Save.

Default Value:

By default, Cosmos DBs are set to have access all networks.

See Also

https://workbench.cisecurity.org/benchmarks/10624