Azure App Service 漏洞列表
共找到 13 个与 Azure App Service 相关的漏洞
📅 加载漏洞趋势中...
-
azure-appservice-always-on-disabled: Azure App Service Always On Disabled POC
Ensure that your Microsoft Azure App Services web applications have Always On feature enabled in order to prevent applications from being idled out due to inactivity. Always On keeps your websites/web applications loaded even when there's no traffic. -
azure-appservice-auth-disabled: Azure App Service Authentication Not Enabled POC
Ensure that App Service Authentication feature is enabled for Microsoft Azure App Service to add an extra layer of security to the authentication process implemented by your web applications. -
azure-appservice-backup-not-enabled: Azure App Service Automated Backup Not Configured POC
Ensure that Backup and Restore feature is enabled and configured to create custom backups for your Microsoft Azure App Service applications. -
azure-appservice-backup-retention-missing: Azure App Service Backup Retention Not Configured POC
Ensure that your Microsoft Azure App Services applications have a sufficient daily backup retention period configured for scheduled backups, in order to follow security and regulatory requirements. Prior to running this rule by the Cloud Conformity engine, the backup retention period must be configured in the rule settings, on the Cloud Conformity account dashboard. A retention value of 0 will keep backup files indefinitely. -
azure-appservice-client-cert-disabled: Azure App Service Client Certificate Not Required POC
Ensure that your Microsoft Azure App Service web applications are configured to require an SSL certificate from all incoming requests, for security and compliance purposes. Once the certificate is implemented, only web clients that have this valid SSL certificate will be able to reach your web application. By default, incoming client certificates are disabled for Azure App Service web applications. -
azure-appservice-entra-id-missing: Azure App Service Microsoft Entra ID Not Configured POC
Ensure that registration with Microsoft Entra ID is enabled for Microsoft Azure App Service web applications so that your applications can connect to other Azure cloud services securely without the need of access credentials such as user names and passwords. -
azure-appservice-ftp-deployment-disabled: Azure App Service Plain FTP Deployment Disabled POC
Ensure that your Microsoft Azure App Services web applications are not configured to be deployed over plain FTP. Instead, the deployment can be disabled over FTP or performed over FTPS. FTPS (Secure FTP) is used to enhance security for your Azure web application as it adds an extra layer of security to the FTP protocol, and helps you to comply with industry standards and regulations. -
azure-appservice-ftps-only-not-enabled: Azure App Service FTPS-Only Access Not Enabled POC
Ensure that your Azure App Services web applications enforce FTPS-only access to encrypt FTP traffic. FTPS (Secure FTP) is used to enhance security for your Azure web application as it adds an extra layer of security to the FTP protocol, and help you to comply with the industry standards and regulations. -
azure-appservice-http2-not-enabled: Azure App Service HTTP/2 Not Enabled POC
Ensure that your Microsoft Azure App Service web applications are using the latest version of the HTTP protocol (i.e. HTTP/2) in order to make your web applications load faster. HTTP 2.0 represents a major upgrade of the HTTP/1.1 protocol, with the primary goals of reducing the impact of latency and connection load on web servers through full request and response multiplexing, minimizing protocol overhead via HTTP header field compression, and supporting HTTP request prioritization and server push. -
azure-appservice-https-only-not-enforced: Azure App Service HTTPS-Only Not Enforced POC
Ensure that your Azure App Service web applications redirect all non-secure HTTP traffic to HTTPS in order to encrypt the communication between applications and web clients. HTTPS uses the Secure Sockets Layer (SSL)/Transport Layer Security (TLS) protocol to provide a secure connection, which is both encrypted and authenticated. This adds an extra layer of security to the HTTP requests made to the web application. -
azure-appservice-insights-not-enabled: Azure App Service Application Insights Not Enabled POC
Ensure that the Application Insights feature is enabled for all your Microsoft Azure App Services applications in order to provide advanced application monitoring. Application Insights is an extensible Application Performance Management (APM) service for developers and DevOps professionals available as monitoring feature within Azure cloud. The feature monitors your live App Services applications to automatically detect performance anomalies. It includes powerful analytics tools to help diagnose issues and understand what users do with your application. Application Insights can be enabled for apps on various platforms including .NET, Node.js, and Java EE, hosted on-premises, hybrid, or other public cloud platforms. -
azure-appservice-remote-debugging-enabled: Azure App Service Remote Debugging Enabled POC
Ensure that your Azure App Services web applications have remote debugging disabled in order to enhance security and protect the applications from unauthorized access. Remote Debugging feature is available for web applications (e.g. ASP.NET, ASP.NET Core, Node.js, Python). -
azure-appservice-tls-latest-version-missing: Azure App Service TLS Latest Version Not Configured POC
Ensure that all Microsoft Azure App Service web applications are using the latest version of TLS encryption protocol to secure the applications traffic over the Internet and comply with the industry standards. This check verifies if the minimum TLS version configured is not "1.2", indicating that the latest version of TLS is not used.