last sync: 2024-Nov-25 18:54:24 UTC

MySQL database servers enforce SSL connections.

Azure Landing Zones (ALZ) Policy definition

Source Repository Azure Landing Zones (ALZ) GitHub
JSON Deny-MySql-http
Deploy policy Deny-MySql-http (1.1.0) to Azure
Display name MySQL database servers enforce SSL connections.
Id Deny-MySql-http
Version 1.1.0
Details on versioning
Category SQL
Description Azure Database for MySQL supports connecting your Azure Database for MySQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against 'man in the middle' attacks by encrypting the data stream between the server and your application. This configuration enforces that SSL is always enabled for accessing your database server.
Mode Indexed
Type Custom Azure Landing Zones (ALZ)
Preview False
Deprecated False
Effect Default
Deny
Allowed
Audit, Disabled, Deny
RBAC role(s) none
Rule aliases IF (2)
Alias Namespace ResourceType Path PathIsDefault DefaultPath Modifiable
Microsoft.DBforMySQL/servers/minimalTlsVersion Microsoft.DBforMySQL servers properties.minimalTlsVersion True False
Microsoft.DBforMySQL/servers/sslEnforcement Microsoft.DBforMySQL servers properties.sslEnforcement True True
Rule resource types IF (1)
Microsoft.DBforMySQL/servers
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State
[Deprecated]: Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit Enforce-EncryptTransit Encryption Deprecated
Deny or Deploy and append TLS requirements and SSL enforcement on resources without Encryption in transit Enforce-EncryptTransit_20240509 Encryption GA
History
Date/Time (UTC ymd) (i) Change type Change detail
2024-10-10 01:17:21 change Minor (1.0.0 > 1.1.0)
JSON compare
compare mode: version left: version right:
JSON
EPAC
Deploy policy Deny-MySql-http (1.1.0) to Azure