This article is contributed. See the original author and article here.
We are excited to announce limited General Availability of Azure Defender for new Microsoft Azure Database for PostgreSQL – Flexible Server instances. This is another add-on, which, if deployed, provides another important security barrier to your Azure PostgreSQL server in addition to existing security features, we blogged about earlier.
In the following article, we will discuss how adding Azure Defender for OSS databases with your PostgreSQL Flexible server will help you secure your applications from hacking attacks.
Protection against brute force attacks
A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly.
These attacks are done by ‘brute force’ meaning they use excessive forceful attempts to try and ‘force’ their way into your private account(s).
The “brute-force” terminology is derived from the tactic of using constant attempts or excessive “force” until the threat actor arrives at the desired result—entry into a system with the right credentials. Despite this being one of the oldest hacking methodologies, according to Verizon’s 2020 Data Breach Investigations Report, hacking, which includes brute forcing passwords, remains the primary attack vector. Over 80% of breaches caused by hacking involve brute force or the use of lost or stolen credentials.
When Microsoft Defender detects a brute force attack, it triggers an alert to bring you awareness that a brute force attack took place. It also can separate simple brute force attack from brute force attack on a valid user or a successful brute force attack.
Detecting anomalous database access patterns
Databases may store extremely sensitive business information, making them a major target for attackers. Therefore, securing their data from damage or leakage is a critical issue. To manage this, enterprises typically implement several layers of protection between users and data, working at the network, host, and database levels. The data protection at database level includes the access control models to limit the permissions to of legitimate users to read, write data and encryption at times. These security models are sometimes insufficient to prevent misuse, especially insider abuse by legitimate users. When Microsoft Defender detects anomalous pattern, it fires an alert to make you aware of such activity as well.
Enabling Microsoft Defender with PostgreSQL Flexible Server
- From the Azure portal, navigate to Security menu in the left pane.
- Pick Microsoft Defender for Cloud
- Click Enable in the right pane.
Resources
For more information on Azure Defender and its use with Postgres Flexible Server see following:
- Security in Azure Database for PostgreSQL – Flexible Server | Microsoft Learn
- Microsoft Defender for open-source relational databases – the benefits and features – Microsoft Defender for Cloud | Microsoft Learn
- Reference table for all security alerts – Microsoft Defender for Cloud | Microsoft Learn
To learn more about our Flexible Server managed service, see the Azure Database for PostgreSQL service page. We’re always eager to hear customer feedback, so please reach out to us at Ask Azure DB for PostgreSQL.
Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.
Recent Comments