CCSS (Common Configuration Scoring System) is a set of measures used to determine the severity of the rule.
Each rule is associated with a high-level category. For example IAM, Container, Monitoring, Logging, Network, etc.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsInbound traffic is allowed to a resource from any source instead of a restricted range, and potentially everyone can access your resource.
Set properties.startIP
to specific IP range only, e.g. 192.168.1.0/24
in firewall rule.
Set start_ip
and end_ip
to specific IP range only, e.g. 192.168.1.0
.
resource "azurerm_redis_firewall_rule" "allowed" {
name = "someIPrange"
redis_cache_name = azurerm_redis_cache.example569.name
resource_group_name = azurerm_resource_group.example569.name
start_ip = "192.168.1.0"
end_ip = "192.168.1.0"
}