Skip to content

Commit cce3087

Browse files
authored
Merge pull request #109343 from TimShererWithAquent/us1679050bu
Change SSL to TLS per 1679050
2 parents bdec3b4 + 4e9e5c6 commit cce3087

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

articles/mariadb/security-baseline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -506,7 +506,7 @@ Understand customer data protection in Azure: https://docs.microsoft.com/azure/s
506506

507507
### 4.4: Encrypt all sensitive information in transit
508508

509-
**Guidance**: Azure Database for MariaDB supports connecting your Azure Database for MariaDB server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your MariaDB instances.
509+
**Guidance**: Azure Database for MariaDB supports connecting your Azure Database for MariaDB server to client applications using Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL). Enforcing TLS connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your MariaDB instances.
510510

511511
How to configure encryption in transit for MariaDB: https://docs.microsoft.com/azure/mariadb/howto-configure-ssl
512512

articles/postgresql/security-baseline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ Understand service tag usage for Azure Database for PostgreSQL: https://docs.mic
126126

127127
- DDoS Protection Standard should be enabled
128128

129-
- Enforce SSL connection should be enabled for PostgreSQL database servers
129+
- Enforce TLS connection should be enabled for PostgreSQL database servers
130130

131131
How to configure and manage Azure Policy: https://docs.microsoft.com/azure/governance/policy/tutorials/create-and-manage
132132

@@ -521,7 +521,7 @@ Understand customer data protection in Azure: https://docs.microsoft.com/azure/s
521521

522522
### 4.4: Encrypt all sensitive information in transit
523523

524-
**Guidance**: Azure Database for PostgreSQL supports connecting your PostgreSQL server to client applications using Secure Sockets Layer (SSL). Enforcing SSL connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your Azure Database for PostgreSQL instances by default.
524+
**Guidance**: Azure Database for PostgreSQL supports connecting your PostgreSQL server to client applications using Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL). Enforcing TLS connections between your database server and your client applications helps protect against "man in the middle" attacks by encrypting the data stream between the server and your application. In the Azure portal, ensure "Enforce SSL connection" is enabled for all of your Azure Database for PostgreSQL instances by default.
525525

526526
Currently the TLS version supported for Azure Database for PostgreSQL are TLS 1.0, TLS 1.1, TLS 1.2.
527527

@@ -790,7 +790,7 @@ How to configure Conditional Access to block access to Azure Resource Manager: h
790790

791791
**Guidance**: Define and implement standard security configurations for your Azure Database for PostgreSQL instances with Azure Policy. Use Azure Policy aliases in the "Microsoft.DBforPostgreSQL" namespace to create custom policies to audit or enforce the network configuration of your Azure Database for PostgreSQL instances. You may also make use of built-in policy definitions related to your Azure Database for PostgreSQL instances, such as:
792792

793-
- Enforce SSL connection should be enabled for PostgreSQL database servers
793+
- Enforce TLS connection should be enabled for PostgreSQL database servers
794794

795795
- Log connections should be enabled for PostgreSQL database servers
796796

articles/security/benchmarks/security-control-network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Deploy the firewall solution of your choice at each of your organization's netwo
114114
|--|--|--|
115115
| 1.7 | 12.9, 12.10 | Customer |
116116

117-
Deploy Azure Application Gateway for web applications with HTTPS/SSL enabled for trusted certificates.
117+
Deploy Azure Application Gateway for web applications with HTTPS/TLS enabled for trusted certificates.
118118

119119
- [How to deploy Application Gateway](https://docs.microsoft.com/azure/application-gateway/quick-create-portal)
120120

0 commit comments

Comments
 (0)