Ensure MySQL is using the latest version of TLS encryption
Ce produit n'est pas pris en charge par le
site Datadog que vous avez sélectionné. (
).
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Id: c2a1d4e6-f789-4b0c-9e12-3456789abcde
Cloud Provider: Azure
Platform: Terraform
Severity: High
Category: Networking and Firewall
Learn More
Description
Outdated TLS versions (TLS 1.0/1.1) contain vulnerabilities that can be exploited by attackers to intercept sensitive data transmitted between the client and the MySQL server. When TLS 1.0/1.1 is used, your database traffic becomes vulnerable to man-in-the-middle attacks, potentially exposing usernames, passwords, and sensitive data. Using TLS 1.2 addresses these security weaknesses and provides stronger encryption algorithms and more secure cipher suites. To ensure proper configuration, replace ssl_minimal_tls_version_enforced = ["TLS1_0"] with ssl_minimal_tls_version_enforced = ["TLS1_2"] in your Azure MySQL server resource.
Compliant Code Examples
resource "azurerm_mysql_server" "good_example" {
name = "good-mysql-server"
location = "East US"
resource_group_name = "example-rg"
ssl_minimal_tls_version_enforced = ["TLS1_2"] # ✅ Correct TLS version
}
Non-Compliant Code Examples
resource "azurerm_mysql_server" "bad_example" {
name = "bad-mysql-server"
location = "East US"
resource_group_name = "example-rg"
ssl_minimal_tls_version_enforced = ["TLS1_0"] # ❌ Outdated TLS version
}