/
Private Endpoint Should Be Enabled for PostgreSQL Servers
Private Endpoint Should Be Enabled for PostgreSQL Servers
Description:
Private endpoint connections enforce secure communication by enabling private connectivity to Azure Database for PostgreSQL. Configure a private endpoint connection to enable access to traffic coming only from known networks and prevent access from all other IP addresses, including within Azure.
Solution/Reference:
To configure Private Link for Azure Database for PostgreSQL:
1. Navigate to your Azure Database for PostgreSQL.
2. Select Private Endpoint Connections in the left-hand pane
3. Click on "+Private Endpoint" and follow the instructions provided https://docs.microsoft.com/azure/postgresql/howto-configure-privatelink-portal.
For more information, see: https://aka.ms/pgprivatelink
, multiple selections available,
Related content
Public Network Access Should Be Disabled for PostgreSQL Servers
Public Network Access Should Be Disabled for PostgreSQL Servers
More like this
Enforce SSL Connection Should be Enabled for PostgreSQL Database Servers
Enforce SSL Connection Should be Enabled for PostgreSQL Database Servers
More like this
Private Endpoint Connections on Azure SQL Database Should Be Enabled
Private Endpoint Connections on Azure SQL Database Should Be Enabled
More like this
Private Endpoint Should Be Enabled for MySQL Servers
Private Endpoint Should Be Enabled for MySQL Servers
More like this
Private Endpoint Should Be Enabled for MariaDB Servers
Private Endpoint Should Be Enabled for MariaDB Servers
More like this
Public Network Access on Azure SQL Database Should Be Disabled
Public Network Access on Azure SQL Database Should Be Disabled
More like this