CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsInbound traffic is allowed to a resource from any source instead of a restricted range and potentially everyone can access your resource.
Set properties.networkRuleCollections.properties.rules.sourceAddresses
attribute to specific IP range only, e.g. 192.168.1.0/24
.
Set rule.source_addresses
to specific CIDR block range only, e.g. 192.168.1.0/24
.
resource "azurerm_firewall_network_rule_collection" "allowed" {
name = "testcollection"
azure_firewall_name = "test"
resource_group_name = azurerm_resource_group.example.name
priority = 100
action = "Allow"
rule {
name = "testrule"
source_addresses = [
"192.168.1.0/24",
]
destination_ports = [
"53",
]
destination_addresses = [
"8.8.8.8",
"8.8.4.4",
]
protocols = [
"TCP",
"UDP",
]
}
}