Azure_VirtualNetworks_40

VirtualMachine with service Cassandra (TCP:7001) is exposed to a small public network scope

Description

Cassandra is considered a protocol that should only be exposed in private networks, for a limited scope, allowing access to only applications and services that requires access. Limiting access is a good practice that prevents exploits through public interfaces or east west lateral movement. This rule detects network settings that allow over permissive network access for Cassandra

Remediation

Limit the access scope for Prevalent known internal port to only allow access in internal networks and limited scope.

If a public interface exists, remove it and limit the access scope within the VNET only to applications or instances that require access. See https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview.

Service

Networking

Severity

Low

Compliance

Mapping

We are now live on AWS Marketplace.
The integrated view of your cloud infrastructure is now easier than ever!