Azure.NSG.LateralTraversal #1622
Replies: 1 comment 2 replies
-
properties: {
securityRules: [
// Inbound Rules
{
name: 'AllowHttpsInbound'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 120
sourceAddressPrefix: 'Internet'
destinationAddressPrefix: '*'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowGatewayManagerInbound'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 130
sourceAddressPrefix: 'GatewayManager'
destinationAddressPrefix: '*'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowAzureLoadBalancerInbound'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 140
sourceAddressPrefix: 'AzureLoadBalancer'
destinationAddressPrefix: '*'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowBastionHostCommunication'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 150
sourceAddressPrefix: 'VirtualNetwork'
destinationAddressPrefix: 'VirtualNetwork'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRanges: [
'8080'
'5701'
]
}
}
// Outbound Rules
{
name: 'AllowSshRDPOutbound'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 100
sourceAddressPrefix: '*'
destinationAddressPrefix: 'VirtualNetwork'
protocol: '*'
sourcePortRange: '*'
destinationPortRanges: [
'22'
'3389'
]
}
}
{
name: 'AllowAzureCloudOutbound'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 110
sourceAddressPrefix: '*'
destinationAddressPrefix: 'AzureCloud'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowBastionCommunication'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 120
sourceAddressPrefix: 'VirtualNetwork'
destinationAddressPrefix: 'VirtualNetwork'
protocol: '*'
sourcePortRange: '*'
destinationPortRanges: [
'8080'
'5701'
]
}
}
{
name: 'AllowGetSessionInformation'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 130
sourceAddressPrefix: '*'
destinationAddressPrefix: 'Internet'
protocol: '*'
sourcePortRange: '*'
destinationPortRange: '80'
}
}
]
} With this set of the NSG Rules, the tests should pass because these are the rules related to |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Azure.NSG.LateralTraversal
Deny outbound management connections from non-management hosts.
https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.NSG.LateralTraversal/
Beta Was this translation helpful? Give feedback.
All reactions