Check your Microsoft Azure network security groups (NSGs) for inbound rules that allow unrestricted access (i.e. 0.0.0.0/0) via TCP or UDP to a selected range of ports and restrain access to only those IP addresses that require the relevant access. Restrict the access in order to implement the principle of least privilege and reduce the possibility of a breach.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Exposing certain ports to the Internet can increase opportunities for malicious activities such as hacking, man-in-the-middle attacks (MITM) and brute-force attacks. Cloud Conformity strongly recommends that you configure your Microsoft Azure NSGs to limit inbound traffic on selected TCP and UDP ports to known IP addresses only.
Audit
To determine if your Azure network security groups (NSGs) allows unrestricted access on certain selected ports, perform the following actions:
Remediation / Resolution
To update your Azure network security group security rules in order to restrict access to specific, authorized entities only (such as IP addresses or IP ranges), perform the following actions:
References
- Azure Official Documentation
- Azure network security overview
- Network security groups
- Create, change, or delete a network security group
- Azure PowerShell Documentation
- az network nsg list
- az network nsg rule list
- az network nsg rule update