Azure.NSG.LateralTraversal #1622
Replies: 1 comment 2 replies
-
properties: {
securityRules: [
// Inbound Rules
{
name: 'AllowHttpsInbound'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 120
sourceAddressPrefix: 'Internet'
destinationAddressPrefix: '*'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowGatewayManagerInbound'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 130
sourceAddressPrefix: 'GatewayManager'
destinationAddressPrefix: '*'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowAzureLoadBalancerInbound'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 140
sourceAddressPrefix: 'AzureLoadBalancer'
destinationAddressPrefix: '*'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowBastionHostCommunication'
properties: {
access: 'Allow'
direction: 'Inbound'
priority: 150
sourceAddressPrefix: 'VirtualNetwork'
destinationAddressPrefix: 'VirtualNetwork'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRanges: [
'8080'
'5701'
]
}
}
// Outbound Rules
{
name: 'AllowSshRDPOutbound'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 100
sourceAddressPrefix: '*'
destinationAddressPrefix: 'VirtualNetwork'
protocol: '*'
sourcePortRange: '*'
destinationPortRanges: [
'22'
'3389'
]
}
}
{
name: 'AllowAzureCloudOutbound'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 110
sourceAddressPrefix: '*'
destinationAddressPrefix: 'AzureCloud'
protocol: 'Tcp'
sourcePortRange: '*'
destinationPortRange: '443'
}
}
{
name: 'AllowBastionCommunication'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 120
sourceAddressPrefix: 'VirtualNetwork'
destinationAddressPrefix: 'VirtualNetwork'
protocol: '*'
sourcePortRange: '*'
destinationPortRanges: [
'8080'
'5701'
]
}
}
{
name: 'AllowGetSessionInformation'
properties: {
access: 'Allow'
direction: 'Outbound'
priority: 130
sourceAddressPrefix: '*'
destinationAddressPrefix: 'Internet'
protocol: '*'
sourcePortRange: '*'
destinationPortRange: '80'
}
}
]
}With this set of the NSG Rules, the tests should pass because these are the rules related to |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Azure.NSG.LateralTraversal
Deny outbound management connections from non-management hosts.
https://azure.github.io/PSRule.Rules.Azure/en/rules/Azure.NSG.LateralTraversal/
Beta Was this translation helpful? Give feedback.
All reactions