Ensure that the IP forwarding feature enabled for your Microsoft Azure virtual machines (VMs) is being monitored by the Azure Security Center service for security and compliance purposes.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Enabling IP forwarding on a virtual machine's network interface (NIC) allows the machine to act as a router and receive traffic addressed to other destinations. IP forwarding is rarely required (for example, when using the virtual machine as a network virtual appliance), therefore the feature should be monitored in order to be audited by your network security team.
Audit
To determine if the IP forwarding feature for virtual machines is continuously monitored using Microsoft Defender for Cloud, perform the following actions:
Remediation / Resolution
To enable virtual machine IP forwarding monitoring using Microsoft Defender for Cloud, perform the following actions:
References
- Azure Official Documentation
- Microsoft Defender for Cloud documentation
- What is Microsoft Defender for Cloud?
- Azure Policy built-in policy definitions
- Manage security policies
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az
- az account get-access-token
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
Enable Virtual Machine IP Forwarding Monitoring
Risk Level: Medium