Security Group should restrict UDP access from the internet

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Description

Regular evaluation of network security groups is essential to identify and address any misconfigurations related to ports. It is important to assess the necessity of certain ports and protocols that may be exposed to the internet and restrict them if they are not explicitly required. This is crucial as broad exposure of UDP services can lead to potential security issues, such as attackers utilizing DDoS amplification techniques to cause disruptions within the Azure Virtual Network and even target external networked devices. Commonly exploited UDP-based services, including DNS, NTP, SSDP, SNMP, and CLDAP, can be used as amplification sources by attackers.

Remediation

If UDP is not explicitly required and narrowly configured for resources attached to the Network Security Group, Internet-level access to your Azure resources should be restricted or eliminated.

To reconfigure UDP access in Azure Security Groups, follow these steps:

  1. Log in to the Azure portal at https://portal.azure.com and navigate to the Azure Security Group that contains the virtual machine(s) you want to modify.

  2. In the Security Group settings, locate the inbound or inbound security rules section depending on your desired configuration.

  3. Look for the specific rule that allows UDP access from the internet. This is usually denoted by the source IP set to “Internet”, “Any” or “0.0.0.0/0”.

  4. Edit the rule and update the source IP to a more restricted range or a specific IP address that is allowed to initiate UDP connections. Alternatively, you can remove the rule altogether if UDP access is not required from the internet.

  5. Save the changes to the Security Group.

For internal access to relevant resources, consider configuring an encrypted network tunnel using one of the following options:

  1. ExpressRoute: To establish a private connection between your on-premises network and Azure, you can utilize ExpressRoute. This provides a dedicated and reliable connection with higher security and better network performance. Read about ExpressRoute to learn more.

  2. Site-to-site VPN: You can set up a site-to-site VPN to connect your on-premises network to Azure securely. This creates an encrypted tunnel over the internet, allowing you to access Azure resources securely as if they were on the same network. For more information, read create a site-to-site VPN.

  3. Point-to-site VPN: This option enables secure connections between individual devices and Azure resources. Point-to-site VPN allows remote clients to connect to Azure securely over the internet. To learn more, read configuring a point-to-site VPN.

PREVIEWING: piotr_wolski/update-dsm-docs