nuclei-templates/cloud/azure/redis/azure-redis-nonssl-port-dis...

54 lines
1.9 KiB
YAML

id: azure-redis-nonssl-port-disabled
info:
name: Azure Redis Cache In-Transit Encryption Not Enabled
author: princechaddha
severity: high
description: |
Ensure that the SSL connection to your Azure Redis Cache servers is enabled in order to meet cloud security and compliance requirements. Enforcing an SSL connection helps prevent unauthorized users from reading sensitive data that is intercepted as it travels through the network, between clients/applications and cache servers, known as data in transit.
impact: |
Not enabling SSL connections on Redis Cache servers allows sensitive data to be intercepted during transmission, increasing the risk of data breaches and non-compliance with regulatory standards.
remediation: |
Enable SSL on your Azure Redis Cache servers and ensure the non-SSL port (6379) is disabled to enforce encryption in transit.
reference:
- https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-configure#ssl-ports
tags: cloud,devops,azure,microsoft,redis,azure-cloud-config
flow: |
code(1);
for (let CacheData of iterate(template.redisList)) {
set("name", CacheData);
code(2);
}
self-contained: true
code:
- engine:
- sh
- bash
source: |
az redis list --query '[*].id'
extractors:
- type: json
name: redisList
internal: true
json:
- '.[]'
- engine:
- sh
- bash
source: |
az redis show --ids "$name" --query 'enableNonSslPort'
matchers-condition: and
matchers:
- type: word
words:
- 'true'
extractors:
- type: dsl
dsl:
- 'name + " has non-SSL port enabled, therefore encryption in transit is not enforced."'
# digest: 490a00463044022079152622dd05f91808596fb75621ac923cafc5e0d8f712952ed576761ab02e2202204e4ac61d0a103df4a68c7c033e54e25a1217dabba9a160da7a36b145af865401:922c64590222798bb761d5b6d8e72950