Subnets should be associated with a Network Security Group

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Description

This rule checks whether subnets in Azure are associated with a Network Security Group. Ensuring that subnets are associated with a Network Security Group helps enhance the security posture of the Azure environment by adding an additional layer of protection to network traffic within the subnet.

Remediation

To associate a subnet with a Network Security Group in Azure, follow these steps:

  1. Navigate to the Azure portal and open the ‘Subnets’ blade for the desired virtual network.
  2. Select the subnet that needs to be associated with a Network Security Group, go to the ‘Settings’ tab, and under ‘Security’, associate the desired Network Security Group. For detailed instructions, see: Associate or dissociate a network security group to or from a subnet.
PREVIEWING: rtrieu/product-analytics-ui-changes