Plugin Title Open MySQL
Cloud GOOGLE
Category VPC Network
Description Determines if TCP port 4333 or 3306 for MySQL is open to the public
More Info While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as MySQL should be restricted to known IP addresses.
AWS Link https://cloud.google.com/vpc/docs/using-firewalls
Recommended Action Restrict TCP ports 4333 and 3306 to known IP addresses.


Detailed Remediation Steps

  1. Log into the Google Cloud Platform Console.
  2. Scroll down the left navigation panel and choose the "Networking" to select the "Firewall rules" option under the "VPC network."
  3. On the "Firewall rules" page, select the "Firewall rule" which needs to be verified.
  4. On the selected "Firewall rules", if TCP port 4333 or 3306 for "MySQL" are open to the public then the selected "Firewall rule" is not as per the best standards.
  5. Repeat steps number 2 - 4 to verify another "Firewall rule" in the network.
  6. Navigate to "VPC network" and choose the "Firewall rules" option under the "Networking" and select the "Firewall rule" which needs to be restricted to known IP addresses.
  7. On the "Firewall rules" page, click on the "Edit" button at the top and under the "Source IP ranges" enter the IP addresses as per the requirements.
  8. Click on the "Save" button at the bottom to make the changes.
  9. Repeat steps number 6 - 8 to restrict TCP ports 4333 and 3306 to known IP addresses.

Want to scan for this risk automatically?

Get Started Now