diff --git a/en/azure/networksecuritygroups/open-http.md b/en/azure/networksecuritygroups/open-http.md new file mode 100644 index 000000000..d8ae3c930 --- /dev/null +++ b/en/azure/networksecuritygroups/open-http.md @@ -0,0 +1,28 @@ +[![CloudSploit](https://cloudsploit.com/img/logo-new-big-text-100.png "CloudSploit")](https://cloudsploit.com) + +# AZURE / Network Security Groups / Open HTTP + +## Quick Info + +| | | +|-|-| +| **Plugin Title** | Open HTTP | +| **Cloud** | AZURE | +| **Category** | Network Security Groups | +| **Description** | Determine if TCP port 80 for HTTP is open to the public | +| **More Info** | Network security groups should be periodically evaluated for port misconfigurations. Where certain ports and protocols may be exposed to the Internet, they should be evaluated for necessity and restricted wherever they are not explicitly required and narrowly configured. | +| **AZURE Link** | https://docs.microsoft.com/en-us/azure/virtual-network/manage-network-security-group | +| **Recommended Action** | Restrict TCP port 80 to known IP addresses. | + +## Detailed Remediation Steps +1. Log in to the Microsoft Azure Management Console. +2. Click on the search bar at the top and search for Network security groups.
+3. Select the "Network security group" that needs to be verified.
+4. Click on the "Name" of the selected "Network security group" to access the port configurations.
+5. In the "Overview" tab scroll down the page and check the "Inbound security rules" under the "Settings".
+6. If the port 80 with the protocol "TCP" is showing as "Allow" under "Actions" column for all "Source" and "Destination" then the selected "Network security group" has TCP port 80 for HTTP open to the public.
+7. Repeat steps number 2 - 6 to verify other "Network security groups".
+8. Navigate to the "Network security group" and select the security group that needs to be modified for restricting the "TCP" port for "HTTP" on port 80 to specific IP Address.
+9. Scroll down the left navigation panel and choose "Inbound security rules" under "Settings".
+10. Click on the Rule with PORT 80 and "TCP" protocol in the "Name" column and in the right pane under "Source" select the "IP Address" from the dropdown menu and enter the "Source IP addresses/CIDR ranges" as per the requirement, select the required Protocol and Action and click on the "Save" option at the top of the pane.
+11. Repeat steps number 8 - 10 to restrict TCP port 80 for HTTP to known IP addresses.
\ No newline at end of file diff --git a/resources/azure/networksecuritygroups/open-http/step10.png b/resources/azure/networksecuritygroups/open-http/step10.png new file mode 100644 index 000000000..9562b428d Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step10.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step2.png b/resources/azure/networksecuritygroups/open-http/step2.png new file mode 100644 index 000000000..f5ca470ad Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step2.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step3.png b/resources/azure/networksecuritygroups/open-http/step3.png new file mode 100644 index 000000000..a429eb814 Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step3.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step4.png b/resources/azure/networksecuritygroups/open-http/step4.png new file mode 100644 index 000000000..559586ccd Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step4.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step5.png b/resources/azure/networksecuritygroups/open-http/step5.png new file mode 100644 index 000000000..bbc09480a Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step5.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step6.png b/resources/azure/networksecuritygroups/open-http/step6.png new file mode 100644 index 000000000..c8804c7f9 Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step6.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step8.png b/resources/azure/networksecuritygroups/open-http/step8.png new file mode 100644 index 000000000..559586ccd Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step8.png differ diff --git a/resources/azure/networksecuritygroups/open-http/step9.png b/resources/azure/networksecuritygroups/open-http/step9.png new file mode 100644 index 000000000..bbc09480a Binary files /dev/null and b/resources/azure/networksecuritygroups/open-http/step9.png differ