Azure Networking

Overview
Critical
11
High
0
Medium
6
Low
20
Informational
0
Security issues (37)
Severity Non-Compliance Region Resource Issue Remediation Read more Action
Low centralus my-virtual-network Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low centralus my-virtual-network Virtual Network has only one subnet. To take advantage of an N-tier architecture, where each tier resides in its own subnet, consider creating multiple subnets in each Virtual Network. More info
Medium CIS 6.5 PCI DSS 10.2 HIPAA (Audit) eastus basicNsgtest-scale-set_group-vnet-nic01 Network Security Group (NSG) has flow log retention set to 31 days, while the recommended limit is 90 days. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that NSGs have a sufficient flow log retention period, i.e. 90 days or more. More info
Critical eastus test-vm-nsg Network Security Group (NSG) contains an inbound rule "SSH" that allows unrestricted access on TCP port 22 (SSH server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 22 (SSH server) to known IP addresses only. More info
Low eastus test-vm-nsg Network Security Group (NSG) has no diagnostic settings. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that diagnostic logging is enabled for each NSG. More info
Medium CIS 6.6 eastus Network Network Watcher is not enabled in the region "East US". To locate, diagnose, and gain insights into Azure networks, enable the Network Watcher service in the region "East US". More info
Low eastus test-scale-set_group-vnet Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low eastus test-scale-set_group-vnet Virtual Network has only one subnet. To take advantage of an N-tier architecture, where each tier resides in its own subnet, consider creating multiple subnets in each Virtual Network. More info
Low eastus test-virt-network Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low eastus test-virt-network Virtual Network has only one subnet. To take advantage of an N-tier architecture, where each tier resides in its own subnet, consider creating multiple subnets in each Virtual Network. More info
Low eastus test-vm_group-vnet Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low eastus test-vm_group-vnet Virtual Network has only one subnet. To take advantage of an N-tier architecture, where each tier resides in its own subnet, consider creating multiple subnets in each Virtual Network. More info
Medium PCI DSS 4.2 HIPAA (Encryption) eastus my-load-balancer Network Load Balancer has no HTTPS configured, while other ports are open. To fulfill HIPAA requirements for all data to be transmitted over secure channels, ensure that each Load Balancer is configured to only accept HTTPS connections. More info
Medium eastus my-load-balancer Network Load Balancer has no backend instances or addresses. To avoid the management overhead and costs, delete old Load Balancers that no longer have any backend resources attached. More info
Low eastus my-load-balancer Network Load Balancer has no diagnostic settings. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that diagnostic logging is enabled for each Load Balancer. More info
Low westus2 aks-agentpool-28249642-nsg Network Security Group (NSG) has no diagnostic settings. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that diagnostic logging is enabled for each NSG. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Port_ANY" that allows unrestricted access on all ports (all services). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on all ports (all services) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 22 (SSH server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 22 (SSH server) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 21 (FTP server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 21 (FTP server) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 4333 (MySQL server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 4333 (MySQL server) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Port_RDP" that allows unrestricted access on TCP port 3389 (RDP server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 3389 (RDP server) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 135 (RPC server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 135 (RPC server) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 445 (SMB over TCP). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 445 (SMB over TCP) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 25 (SMTP server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 25 (SMTP server) to known IP addresses only. More info
Critical westus2 open-to-all Network Security Group (NSG) contains an inbound rule "Ranges" that allows unrestricted access on TCP port 23 (Telnet). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 23 (Telnet) to known IP addresses only. More info
Low westus2 open-to-all Network Security Group (NSG) has no diagnostic settings. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that diagnostic logging is enabled for each NSG. More info
Critical westus2 test-vm2-nsg Network Security Group (NSG) contains an inbound rule "SSH" that allows unrestricted access on TCP port 22 (SSH server). To implement the principle of least privilege and reduce the possibility of a breach, configure your NSGs to limit inbound traffic on TCP port 22 (SSH server) to known IP addresses only. More info
Low westus2 test-vm2-nsg Network Security Group (NSG) has no diagnostic settings. To fulfill HIPAA requirements on secure audit record for read/write/delete activities in the system, ensure that diagnostic logging is enabled for each NSG. More info
Low westus2 aks-vnet-28249642 Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low westus2 virt-network-4 Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low westus2 testscaleset_groupvnet421 Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Low westus2 testscaleset_groupvnet421 Virtual Network has only one subnet. To take advantage of an N-tier architecture, where each tier resides in its own subnet, consider creating multiple subnets in each Virtual Network. More info
Low ukwest test-virt-netowrk Virtual Network has DDoS Standard Protection disabled. To protect your cloud resources against DDoS attacks with always-on monitoring and automatic network attack mitigation, ensure that DDoS Protection Standard for Virtual Networks is enabled (a paid feature). More info
Medium PCI DSS 4.2 HIPAA (Encryption) global CDN Profile endpoint allows insecure HTTP origin. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enable HTTPS and disable HTTP for each custom origin endpoint for each CDN Profile. More info
Low global CDN Profile endpoint has request logging disabled. To export basic usage metrics from your CDN endpoint to different sources, ensure that diagnostic logging is enabled for each CDN endpoint for each CDN Profile. More info
Medium PCI DSS 4.2 HIPAA (Encryption) global CDN Profile endpoint allows insecure HTTP origin. To fulfill HIPAA and PCI DSS requirements on strong cryptographic and security protocols for transmitting user data, enable HTTPS and disable HTTP for each custom origin endpoint for each CDN Profile. More info
Low global CDN Profile endpoint has no diagnostic settings. To export basic usage metrics from your CDN endpoint to different sources, ensure that diagnostic logging is enabled for each CDN endpoint for each CDN Profile. More info
Virtual networks (9)
Virtual network name Location Resource group Subnets DDoS protection Provisioning state Security issues
my-virtual-networkCentral UStest-vm_group 1 Succeeded 2 Low (details)
test-scale-set_group-vnetEast UStest-scale-set_group 1 Succeeded 2 Low (details)
test-virt-networkEast UStest-scale-set_group 1 Succeeded 2 Low (details)
test-vm_group-vnetEast UStest-vm_group 1 Succeeded 2 Low (details)
aks-vnet-28249642West US 2MC_test-clust_group_test-cluster_westus2 2 Succeeded 1 Low (details)
virt-network-4West US 2MC_test-clust_group_test-cluster_westus2 2 Succeeded 1 Low (details)
testscaleset_groupvnet421West US 2test-scale-set_group 1 Succeeded 2 Low (details)
new-virt-networkWest US 3MC_test-clust_group_test-cluster_westus2 2 Succeeded
test-virt-netowrkUK WestMC_test-clust_group_test-cluster_westus2 2 Succeeded 1 Low (details)
Network interfaces (1)
Network interface Location Resource group VNet Encryption Accelerated Networking IP forwarding Primary Provisioning state Security issues
test-network-interfaceEast USresource-group Succeeded
Network watchers (1)
Network watcher Location Resource group Provisioning state Security issues
NetworkWatcher_eastusEast USNetworkWatcherRG Succeeded
Load balancers (2)
Load balancer name Location Resource group SKU name Provisioning state Security issues
my-load-balancerEast USNetworkWatcherRGBasic Succeeded 2 Medium + 1 other (details)
kubernetesWest US 2MC_test-clust_group_test-cluster_westus2Standard Succeeded
Network Security Groups (5)
NSG name Location Resource group Provisioning state Security issues
basicNsgtest-scale-set_group-vnet-nic01East UStest-scale-set_group Succeeded 1 Medium (details)
test-vm-nsgEast UStest-vm_group Succeeded 1 Critical + 1 other (details)
aks-agentpool-28249642-nsgWest US 2MC_test-clust_group_test-cluster_westus2 Succeeded 1 Low (details)
open-to-allWest US 2MC_test-clust_group_test-cluster_westus2 Succeeded 9 Critical + 1 other (details)
test-vm2-nsgWest US 2test-scale-set_group Succeeded 1 Critical + 1 other (details)