Skip to main content

SQL database should not be publicly exposed

SeverityExploitabilityProvidersCategories
HIGHMEDIUMGoogle Cloud ProviderDATA

Description

Google Cloud SQL instances are configured to accept connections from trusted networks only. They should not be publicly available.

Impact

Potential data exposureVisible in logsUser interaction requiredPrivileges required
TrueTrueFalseFalse

Potential connection attempt may lead to data leak, data tampering, or denial of service.

Remediation guidelines

Ensure SQL instances are on private networks and only available from required services. Review logs to see if connections have been attempted.

References

How can I help you ?