Hi Carrr •,
Thanks for your patience.
I have got the below reply from the team:
Azure SQL Database has a shared Control Plane due to which we cannot selectively turn off specific version of TLS or weak cipher suites. When customers run scanners against our infra they will see these flagged and it is by design.
Going forward, Azure has announced deprecation of TLS < 1.2 by October 31st 2024; so that will eliminate majority of the weak ciphers. Additionally, we are working on adding TLS 1.3 to Minimal TLS Version so customer can use it to overcome Sweet32 vulnerability.
Are you in a position to use TLS 1.3 today? if yes then our infra does support TLS 1.3 connectivity even though it is not added as an option to Minimal TLS Version.
Hope this helps. Let us know if you have more queries.
Thank you.