SQL database should not be publicly exposed
Severity | Exploitability | Providers | Categories |
---|---|---|---|
HIGH | MEDIUM | Google Cloud Provider | DATA |
Description
Google Cloud SQL instances are configured to accept connections from trusted networks only. They should not be publicly available.
Impact
Potential data exposure | Visible in logs | User interaction required | Privileges required |
---|---|---|---|
True | True | False | False |
Potential connection attempt may lead to data leak, data tampering, or denial of service.
Remediation guidelines
Ensure SQL instances are on private networks and only available from required services. Review logs to see if connections have been attempted.