4.5.1 Ensure That 'Firewalls & Networks' Is Limited to Use Selected Networks Instead of All Networks

Information

Limiting your Cosmos DB to only communicate on whitelisted networks lowers its attack footprint.

Rationale:

Selecting certain networks for your Cosmos DB to communicate restricts the number of networks including the internet that can interact with what is stored within the database.

Impact:

Failure to whitelist the correct networks will result in a connection loss.

Solution

From Azure Portal

Open the portal menu.

Select the Azure Cosmos DB blade.

Select a Cosmos DB account to audit.

Select Networking.

Under Public network access, select Selected networks.

Under Virtual networks, select + Add existing virtual network or + Add a new virtual network.

For existing networks, select subscription, virtual network, subnet and click Add. For new networks, provide a name, update the default values if required, and click Create.

Click Save.

Default Value:

By default, Cosmos DBs are set to have access all networks.

See Also

https://workbench.cisecurity.org/benchmarks/12346

Item Details

Category: SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CA-9, 800-53|CM-7, 800-53|CP-6, 800-53|CP-7, 800-53|PL-8, 800-53|PM-7, 800-53|SA-8, 800-53|SC-7, 800-53|SC-7(5), CSCv7|9.4, CSCv7|14.1

Plugin: microsoft_azure

Control ID: 60d896098bea1cc228ef9352961d7213b17497f8363487a09ac9c151ce4662d5