Check provider logo

Ensure FTP deployments are Disabled

app_ftp_deployment_disabled

Severitymedium
Serviceapp
by Prowler

By default, Azure Functions, Web, and API Services can be deployed over FTP. If FTP is required for an essential deployment workflow, FTPS should be required for FTP login for all App Service Apps and Functions.

Risk

Azure FTP deployment endpoints are public. An attacker listening to traffic on a wifi network used by a remote employee or a corporate network could see login traffic in clear-text which would then grant them full control of the code base of the app or service. This finding is more severe if User Credentials for deployment are set at the subscription level rather than using the default Application Credentials which are unique per App.

Run this check with Prowler CLI

prowler azure --checks app_ftp_deployment_disabled

Run in Prowler Cloud

Remediation

CLI

az webapp config set --resource-group <resource group name> --name <app name> --ftps-state [disabled|FtpsOnly]

Terraform

https://docs.prowler.com/checks/azure/azure-general-policies/ensure-ftp-deployments-are-disabled#terraform

Other

https://www.trendmicro.com/cloudoneconformity/knowledge-base/azure/AppService/ftp-access-disabled.html

WUI

1. Go to the Azure Portal 2. Select App Services 3. Click on an app 4. Select Settings and then Configuration 5. Under General Settings, for the Platform Settings, the FTP state should be set to Disabled or FTPS Only

References:

Source Code

References

Resource Type

Microsoft.Web/sites/config

Related URL