Ensure that the Network Security Groups (NSGs) monitoring is enabled at the subnet level within your Microsoft Azure cloud account.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
When monitoring of NSGs is enabled at the subnet level, Microsoft Defender for Cloud detects Network Security Groups with overly permissive rules and recommends that these be properly configured in order to control the inbound and outbound traffic to and from the associated subnets.
Audit
To determine if the monitoring of Network Security Groups (NSGs) on subnets is enabled within the Microsoft Defender for Cloud security policy, perform the following actions:
Remediation / Resolution
To enable the monitoring of Network Security Groups (NSGs) at the subnet level within the Microsoft Defender for Cloud security policy, perform the following actions:
References
- Azure Official Documentation
- Microsoft Defender for Cloud documentation
- What is Microsoft Defender for Cloud?
- Azure Policy built-in policy definitions
- Manage security policies
- Enable Network Security Groups in Azure Security Center
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az
- az account get-access-token
Unlock the Remediation Steps
Free 30-day Trial
Automatically audit your configurations with Conformity
and gain access to our cloud security platform.
You are auditing:
Monitor Network Security Groups
Risk Level: Medium