Subnets should be associated with a Network Security Group

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Description

This rule checks whether subnets in Azure are associated with a Network Security Group. Ensuring that subnets are associated with a Network Security Group helps enhance the security posture of the Azure environment by adding an additional layer of protection to network traffic within the subnet.

Remediation

To associate a subnet with a Network Security Group in Azure, follow these steps:

  1. Navigate to the Azure portal and open the ‘Subnets’ blade for the desired virtual network.
  2. Select the subnet that needs to be associated with a Network Security Group, go to the ‘Settings’ tab, and under ‘Security’, associate the desired Network Security Group. For detailed instructions, see: Associate or dissociate a network security group to or from a subnet.
PREVIEWING: rtrieu/product-analytics-ui-changes