<  Back to rules search

Azure Network Security Group Open to the World

azure

Classification:

attack

Tactic:

Technique:

Set up the azure integration.

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when an Azure network security group allows inbound traffic from all IP Addresses.

Strategy

This rule monitors Azure Activity logs for network changes and detects when the @evt.name has a value of MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/WRITE, @properties.securityRules.properties.direction has a value of Inbound, @properties.securityRules.properties.access has a value of Allow, and @properties.securityRules.properties.sourceAddressPrefix has a value of either 0.0.0.0/0 OR *.

Triage and response

  1. Inspect which Virtual Machines are associated with this security group.
  2. Determine whether this security group and the VMs should permit inbound traffic from all IP addresses.