-
Notifications
You must be signed in to change notification settings - Fork 89
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse files
Browse the repository at this point in the history
- Loading branch information
1 parent
d3d9000
commit 9837410
Showing
11 changed files
with
547 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
--- | ||
severity: Important | ||
category: Security configuration | ||
online version: https://github.com/BernieWhite/PSRule.Rules.Azure/blob/master/docs/rules/en-US/Azure.VirtualNetwork.LateralTraversal.md | ||
--- | ||
|
||
# Limit lateral traversal | ||
|
||
## SYNOPSIS | ||
|
||
Deny outbound management connections from non-management hosts. | ||
|
||
## DESCRIPTION | ||
|
||
Network Security Groups (NSGs) allow virtual machines to be segmented from each other by enforcing access rules for all traffic in/ out of a virtual machine. | ||
|
||
This micro-segmentation approach provides a control to reduce lateral movement between hosts within Azure, a virtual network or an individual subnet. | ||
|
||
Typically, a subset of trusted hosts such as privileged access workstations, bastion hosts or jump boxes will be used for management. Management protocols originating from application workload hosts should be blocked. | ||
|
||
## RECOMMENDATION | ||
|
||
Consider configuring NSGs rules to block outbound management traffic from non-management hosts. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
--- | ||
severity: Awareness | ||
category: Operations management | ||
online version: https://github.com/BernieWhite/PSRule.Rules.Azure/blob/master/docs/rules/en-US/Azure.VirtualNetwork.NICAttached.md | ||
--- | ||
|
||
# Attach NIC or clean up | ||
|
||
## SYNOPSIS | ||
|
||
Network interfaces (NICs) should be attached. | ||
|
||
## DESCRIPTION | ||
|
||
NICs are deployed as resources separate from virtual machines. NICs that are not attached to a virtual machine perform no purpose. | ||
|
||
## RECOMMENDATION | ||
|
||
Consider cleaning up NICs that are not required to reduce management complexity. Also consider using Resource Groups to help manage the lifecycle of related resources together. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
--- | ||
severity: Awareness | ||
category: Operations management | ||
online version: https://github.com/BernieWhite/PSRule.Rules.Azure/blob/master/docs/rules/en-US/Azure.VirtualNetwork.NSGAssociated.md | ||
--- | ||
|
||
# Associate NSGs or clean up | ||
|
||
## SYNOPSIS | ||
|
||
Network Security Groups (NSGs) should be associated. | ||
|
||
## DESCRIPTION | ||
|
||
NSGs basic stateful firewalls that are deployed as separate resources and can be associated to network interfaces or subnets. NSGs that are not associated with a network interface or subnet perform no purpose. | ||
|
||
## RECOMMENDATION | ||
|
||
Consider cleaning up NSGs that are not required to reduce management complexity. Also consider using Resource Groups to help manage the lifecycle of related resources together. |
25 changes: 25 additions & 0 deletions
25
docs/rules/en-US/Azure.VirtualNetwork.NSGDenyAllInbound.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
--- | ||
severity: Important | ||
category: Reliability | ||
online version: https://github.com/BernieWhite/PSRule.Rules.Azure/blob/master/docs/rules/en-US/Azure.VirtualNetwork.NSGDenyAllInbound.md | ||
--- | ||
|
||
# Avoid denying all inbound traffic | ||
|
||
## SYNOPSIS | ||
|
||
Avoid denying all inbound traffic. | ||
|
||
## DESCRIPTION | ||
|
||
Network Security Groups can be configured to block all network traffic inbound to a virtual machine. | ||
|
||
Blocking all inbound traffic into a virtual machine will fail load balancer health probes and other required traffic. | ||
|
||
Inbound network traffic can be whitelisted by including allow rules above deny all inbound rule by specifying a lower priority number. Rules with a lower priority number will be process first. | ||
|
||
## RECOMMENDATION | ||
|
||
Deny all inbound rules should not use priority 100. The lowest configurable priority is 100, meaning that whitelisted network traffic rules can not be placed before the deny all. | ||
|
||
Consider whitelisting inbound network traffic as required. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.