Ensure that the Network Security Groups (NSGs) monitoring is enabled at the subnet level within your Microsoft Azure cloud account.
When monitoring of NSGs is enabled at the subnet level, Microsoft Defender for Cloud detects Network Security Groups with overly permissive rules and recommends that these be properly configured in order to control the inbound and outbound traffic to and from the associated subnets.
Audit
To determine if the monitoring of Network Security Groups (NSGs) on subnets is enabled within the Microsoft Defender for Cloud security policy, perform the following actions:
Remediation / Resolution
To enable the monitoring of Network Security Groups (NSGs) at the subnet level within the Microsoft Defender for Cloud security policy, perform the following actions:
References
- Azure Official Documentation
- Microsoft Defender for Cloud documentation
- What is Microsoft Defender for Cloud?
- Azure Policy built-in policy definitions
- Manage security policies
- Enable Network Security Groups in Azure Security Center
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az
- az account get-access-token