You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By default, App Service will allow plain FTP uploads. There is an existing check that mentions the basic authentication, but not the protocol.
{
"category": "Security",
"subcategory": "Identity and Access Control",
"text": "Disable basic authentication",
"description": "Disable basic authentication for both FTP/FTPS and for WebDeploy/SCM. This disables access to these services and enforces the use of Azure AD secured endpoints for deployment. Note that the SCM site can also be opened using Azure AD credentials.",
"guid": "5d04c2c3-919c-4a0b-8c12-159e114b933d",
"severity": "High",
"link": "https://docs.microsoft.com/azure/app-service/deploy-configure-credentials#disable-basic-authentication"
},
There should be an additional rule to change the requirement to either 'Disabled' or 'FtpsOnly'. Plain FTP is insecure.
The setting is properties.siteConfig.ftpsState and it is one of 'AllAllowed', 'FtpsOnly' or 'Disabled'. AllAllowed is the default value (shown as null in resource graph)
The text was updated successfully, but these errors were encountered:
I'm trying to understand the issue being raised here. By disabling basic auth as the checklist instructs, you effectively disable FTP and FTPS as those don't support AAD auth.
My assumption was that each recommendation was mutually exclusive since you can put "Does not apply" in the spreadsheet.
Disabling WebDeploy would be a big inconvenience for a lot of developers because it means you can't deploy using most of the automated tooling.
My suggestion was is to have a separate rule to have plain FTP disabled. I want to test that FTP/FTPS is correctly disabled when applying the security policy in the existing rule as well.
As the recommendation says, you can still use WebDeploy with AAD credentials when disabling basic authentication. Of course we can add an entry to the checklist that explains to disable FTP/FTPS only, but I was just not sure if that would add much in terms of security; because that would still allow WebDeploy with basic auth; which we really want to avoid customers doing in the context of securing their setup. I sense I might not fully understand what you're driving for here however; so bear with me please. You have a concrete text/example on the change proposed on the checklist please?
By default, App Service will allow plain FTP uploads. There is an existing check that mentions the basic authentication, but not the protocol.
There should be an additional rule to change the requirement to either 'Disabled' or 'FtpsOnly'. Plain FTP is insecure.
The setting is
properties.siteConfig.ftpsState
and it is one of 'AllAllowed', 'FtpsOnly' or 'Disabled'.AllAllowed
is the default value (shown asnull
in resource graph)The text was updated successfully, but these errors were encountered: