Description:

Microsoft Defender for Open-Source Relational Databases is part of Microsoft Defender for Cloud and provides enhanced security features for open-source relational databases such as MySQL, PostgreSQL, and MariaDB. When enabled, Microsoft Defender monitors these databases for vulnerabilities, threats, and misconfigurations, offering proactive protection through threat detection and security insights.

Enabling Microsoft Defender for Open-Source Relational Databases ensures that these open-source database environments are continuously monitored for security risks, including potential exploits, data leaks, and unauthorized access attempts. It provides real-time alerts and security recommendations that help mitigate risks and maintain compliance with industry standards.

Rationale:

By enabling Microsoft Defender for Open-Source Relational Databases, you gain the following benefits:

  • Increased security: Continuous monitoring for vulnerabilities and threats in open-source databases such as MySQL, PostgreSQL, and MariaDB.

  • Early detection: Alerts on any potential attack or misconfiguration, such as SQL injection attempts, data leaks, or malicious access.

  • Improved compliance: Helps meet regulatory requirements by ensuring that databases are properly secured and continuously monitored.

  • Reduced risks: Proactively identifies vulnerabilities, misconfigurations, and threats before they can be exploited by attackers.

Impact:

Setting Microsoft Defender for Open-Source Relational Databases to 'On' will:

  • Enhance security by providing real-time monitoring and proactive alerts for MySQL, PostgreSQL, and MariaDB databases.

  • Generate more alerts: You may receive more security insights and alerts regarding potential threats and vulnerabilities in your open-source relational databases.

  • Increase visibility: Administrators will be able to track security vulnerabilities, threats, and misconfigurations through Defender for Cloud dashboards and insights.

Default Value:

By default, Microsoft Defender for Open-Source Relational Databases is not enabled for most Azure environments. It must be manually configured to ensure that your open-source relational databases are properly monitored and protected.

Pre-requisites:

  • Azure subscription with Microsoft Defender for Cloud enabled.

  • Open-source relational databases (e.g., MySQL, PostgreSQL, MariaDB) deployed in Azure.

  • Global Administrator or Security Administrator permissions to enable Microsoft Defender for Open-Source Relational Databases.

Audit:

  1. Sign in to Azure portal as a Global Administrator or Security Administrator.

  2. Navigate to Microsoft Defender for Cloud > Environment settings.

  3. Ensure that Microsoft Defender for Open-Source Relational Databases is set to 'On' for relevant database instances.

Implementation Steps (Automated):

  1. Sign in to Azure portal:

    • Use an account with Global Administrator or Security Administrator permissions.

  2. Navigate to Microsoft Defender for Cloud:

    • In the Azure portal, go to Microsoft Defender for Cloud.

  3. Go to Environment Settings:

    • Under Microsoft Defender for Cloud, select Environment settings.

  4. Enable Microsoft Defender for Open-Source Relational Databases:

    • In the Environment settings pane, find the option for Microsoft Defender for Open-Source Relational Databases.

    • Set this option to 'On' to enable monitoring and protection for MySQL, PostgreSQL, and MariaDB databases.

  5. Save the Configuration:

    • After setting Microsoft Defender for Open-Source Relational Databases to 'On', click Save to apply the changes.

  6. Verify the Setting:

    • After saving the configuration, verify that Microsoft Defender is monitoring and providing security insights for your open-source relational databases.

    • Check for alerts and recommendations related to MySQL, PostgreSQL, or MariaDB in the Defender for Cloud dashboard.

  7. Monitor Alerts and Security Insights:

    • Begin monitoring Defender for Open-Source Relational Databases for security alerts, vulnerability assessments, and threat detection.

    • Use Azure Monitor or Microsoft Defender for Cloud dashboards to track database vulnerabilities, threats, and security recommendations.

  8. Test the Configuration:

    • To test, you can simulate potential vulnerabilities or misconfigurations in your open-source relational databases and verify that Microsoft Defender generates relevant alerts or security insights.

  9. Communicate to Relevant Teams:

    • Notify relevant teams (e.g., DevOps, Security Operations) about the new monitoring and protection provided by Microsoft Defender for Open-Source Relational Databases.

Backout Plan (Automated):

  1. Sign in to Azure portal:

    • Use an account with Global Administrator or Security Administrator permissions.

  2. Navigate to Microsoft Defender for Cloud:

    • Go to Microsoft Defender for Cloud.

  3. Go to Environment Settings:

    • Under Environment settings, find Microsoft Defender for Open-Source Relational Databases.

  4. Disable Microsoft Defender for Open-Source Relational Databases:

    • Set the option to 'Off' to disable monitoring and protection for MySQL, PostgreSQL, and MariaDB.

  5. Save the Configuration:

    • Click Save to apply the changes.

  6. Test the Reverted Configuration:

    • Verify that the database instances are no longer monitored by Microsoft Defender by checking the absence of security alerts in the Defender for Cloud dashboard.

  7. Monitor the Reversion:

    • Ensure that the configuration has been successfully reverted by confirming that no further Defender for Open-Source Relational Databases alerts are triggered.

References: