Turbot Guardrails Hub 
Hub
  • Mods
  • Policy Packs
  • Docs
  • Home
ModsPolicy PacksDocsHome
Mods
Azure
Loading resources...

Resource Type: Azure > Network > Network Security Group

The Network Security Group (NSG) resource type is a set of network traffic filter rules that can be applied to a network interface or subnet within an Azure Virtual Network, allowing for control over inbound and outbound traffic.

Resource Context

Network Security Group is a part of the Network service.

Each Network Security Group lives under a Resource Group.

Controls

The primary controls for Azure > Network > Network Security Group are:

  • Active
  • Allowed
  • Approved
  • CMDB
  • Configured
  • Discovery
  • Egress Rules
  • Ingress Rules
  • Intelligent Assessment
  • Tags

It is also targeted by these controls:

  • Azure > CIS v1 > 6 Networking > 6.01 Ensure that RDP access is restricted from the internet (Scored)
  • Azure > CIS v1 > 6 Networking > 6.02 Ensure that SSH access is restricted from the internet (Scored)
  • Azure > CIS v2.0 > 06 - Networking > 6.01 - Ensure that RDP access from the Internet is evaluated and restricted
  • Azure > CIS v2.0 > 06 - Networking > 6.02 - Ensure that SSH access from the Internet is evaluated and restricted
  • Azure > CIS v2.0 > 06 - Networking > 6.03 - Ensure that UDP access from the Internet is evaluated and restricted
  • Azure > CIS v2.0 > 06 - Networking > 6.04 - Ensure that HTTP(S) access from the Internet is evaluated and restricted
  • Azure > CIS v3.0 > 07 - Networking > 07.01 - Ensure that RDP access from the Internet is evaluated and restricted
  • Azure > CIS v3.0 > 07 - Networking > 07.02 - Ensure that SSH access from the Internet is evaluated and restricted
  • Azure > CIS v3.0 > 07 - Networking > 07.03 - Ensure that UDP access from the Internet is evaluated and restricted
  • Azure > CIS v3.0 > 07 - Networking > 07.04 - Ensure that HTTP(S) access from the Internet is evaluated and restricted
  • Azure > CIS v4.0 > 08 - Networking > 08.01 - Ensure that RDP access from the Internet is evaluated and restricted
  • Azure > CIS v4.0 > 08 - Networking > 08.02 - Ensure that SSH access from the Internet is evaluated and restricted
  • Azure > CIS v4.0 > 08 - Networking > 08.03 - Ensure that UDP access from the Internet is evaluated and restricted
  • Azure > CIS v4.0 > 08 - Networking > 08.04 - Ensure that HTTP(S) access from the Internet is evaluated and restricted
  • Azure > CIS v5.0 > 7 - Networking Services > 7.01 - Ensure that RDP access from the Internet is evaluated and restricted
  • Azure > CIS v5.0 > 7 - Networking Services > 7.02 - Ensure that SSH access from the Internet is evaluated and restricted
  • Azure > CIS v5.0 > 7 - Networking Services > 7.03 - Ensure that UDP access from the Internet is evaluated and restricted
  • Azure > CIS v5.0 > 7 - Networking Services > 7.04 - Ensure that HTTP(S) access from the Internet is evaluated and restricted

Quick Actions

  • Delete
  • Delete from Azure
  • Revoke Unapproved Rules
  • Router
  • Set Tags
  • Set Tags
  • Skip alarm for Active control
  • Skip alarm for Active control [90 days]
  • Skip alarm for Approved control
  • Skip alarm for Approved control [90 days]
  • Skip alarm for Tags control
  • Skip alarm for Tags control [90 days]

Category

  • Networking

In Your Workspace

  • Controls by Resource Type report
  • Policy Settings by Resource Type report
  • Resources by Resource Type report

Developers

    Resource Type URI
    • tmod:@turbot/azure-network#/resource/types/networkSecurityGroup
  • Category URI
    • tmod:@turbot/turbot#/resource/categories/networking
  • GraphQL
    • query resource(id: "tmod:@turbot/azure-network#/resource/types/networkSecurityGroup") { … }
    • query resourceActivities(filter: "resourceId:'tmod:@turbot/azure-network#/resource/types/networkSecurityGroup'") { … }
    • mutation createResource(input: { … })
    • mutation updateResource(input: { … })
  • CLI
    • Get Resource
    • turbot graphql resource --id "tmod:@turbot/azure-network#/resource/types/networkSecurityGroup"
  • Steampipe Query
    • Get Resource
    • select * from guardrails_resource where resource_type_uri = 'tmod:@turbot/azure-network#/resource/types/networkSecurityGroup';
    • Get Policy Settings (By Resource ID)
    • select * from guardrails_policy_setting where filter = 'resourceTypeId:"tmod:@turbot/azure-network#/resource/types/networkSecurityGroup"';
    • Get Resource Notification
    • select * from guardrails_notification where resource_type_uri = 'tmod:@turbot/azure-network#/resource/types/networkSecurityGroup' and notification_type in ('resource_updated', 'resource_created');
Guardrails
Guardrails Hub
  • Hub
  • Docs
  • Blog
  • Changelog
Products
  • GuardrailsGuardrails
  • PipesPipes
  • SteampipeSteampipe
  • PowerpipePowerpipe
  • FlowpipeFlowpipe
  • TailpipeTailpipe
Turbot
  • Home
  • About us
  • We're hiring!
  • Contact us
Community

Our community of practitioners love to discuss cloud governance & security.

Slack logoJoin us on Slack →

System StatusLegalSecurity
Terms of UseSecurityPrivacy
50
Mods
204
Resource Types
3,575
Policies
1,941
Controls
103
Quick Actions
111
IAM