Azure_VirtualNetworks_107

VirtualMachine with service Known internal web port (TCP:8000) is exposed to a wide public network

Description

Services and databases store data that may be sensitive, protected by law, subject to regulatory requirements or compliance standards. It is highly recommended that access to data will be restricted to encrypted protocols. This rule detects network settings that may expose data via unencrypted protocol over the public internet or to a too wide local scope.

Remediation

Limit the access scope for Prevalent known internal port to only allow access in internal networks and limited scope.

If a public interface exists, remove it and limit the access scope within the VNET only to applications or instances that require access. See https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview.

Service

Networking

Severity

High

Compliance

Mapping

We are now live on AWS Marketplace.
The integrated view of your cloud infrastructure is now easier than ever!