Check provider logo

App Service web app has FTP disabled or FTPS-only enforced

app_ftp_deployment_disabled

Severityhigh
Serviceapp
by Prowler

Azure App Service web apps are evaluated for FTP exposure via the ftpsState setting. Values FtpsOnly or Disabled indicate FTP is not allowed; AllAllowed means both FTP and FTPS are accepted.

Risk

Allowing FTP (unencrypted) exposes credentials on public endpoints, enabling credential theft and session hijacking.

Compromise grants write access to code and content, enabling malicious deployments, backdoors, and data leakage, degrading integrity and confidentiality-with greater blast radius if shared, user-scope publishing credentials are used.

Run this check with Prowler CLI

prowler azure --checks app_ftp_deployment_disabled

Recommendation

Disable FTP or enforce FTPS (ftpsState: FtpsOnly or Disabled).

Prefer CI/CD over manual FTP and apply least privilege with app-scoped credentials. Rotate publishing secrets, enforce modern TLS, and restrict access via private networking. If FTP is unavoidable, require FTPS and monitor publishing logs.

Remediation

CLI

az webapp config set --resource-group <RESOURCE_GROUP> --name <APP_NAME> --ftps-state FtpsOnly

Native IaC
Terraform
Other
  1. In Azure Portal, go to App Services and select your app
  2. Go to Settings > Configuration > General settings
  3. Set FTP state to FTPS only (or Disabled)
  4. Click Save

Source Code

Resource Type

microsoft.web/sites

References