An outbound network security rule allows traffic to /0.
Network security rules should not use very broad subnets.
Where possible, segments should be broken into smaller subnets.
Impact
Recommended Actions
Follow the appropriate remediation steps below to resolve the issue.
Set a more restrictive cidr range
1
2
3
4
5
|
resource "azurerm_network_security_rule" "good_example" {
direction = "Outbound"
destination_address_prefix = "10.0.0.0/16"
access = "Allow"
}
|
Links