Azure – Azure Security Center is now helping you identifying weak network access

You may already know Azure Security Center, your one stop shop for anything security related on Azure, helping you managing and improving your security posture on your Azure resources (and also on-premises ones if you are in hybrid).

Well, Azure Security Center is now also helping you identifying (or more importantly provides a better visibility) on misconfigured network access – identified as Restrict unauthorized network access.

To start reviewing your network security and apply recommendations connect to your Azure portal (https://portal.azure.com/) and access the Security Center

image_thumb

Then access the Recommendations blade and look for Restrict unauthorized network access

image_thumb[1]

The Restrict unauthorized network access provides the following recommendations:

  • IP forwarding on your virtual machine should be disabled
  • Authorized IP ranges should be defined on Kubernetes Services (Preview)
  • Virtual machines should be associated with a Network Security Group
  • CORS should not allow every resource to access your API App
  • CORS should not allow every resource to access your Function App
  • CORS should not allow every resource to access your Web Application
  • Remote debugging should be turned off for API App
  • Remote debugging should be turned off for Function App
  • Remote debugging should be turned off for Web Application
  • Access should be restricted for permissive Network Security Groups with Internet-facing VMs
  • Network Security Group Rules for Internet facing virtual machines should be hardened