CRITICAL
Source
Trivy
ID
AVD-AZU-0051

An outbound network security rule allows traffic to /0.

Network security rules should not use very broad subnets.

Where possible, segments should be broken into smaller subnets.

Impact

The port is exposed for egress to the internet

Follow the appropriate remediation steps below to resolve the issue.

Set a more restrictive cidr range

1
2
3
4
5
 resource "azurerm_network_security_rule" "good_example" {
 	direction = "Outbound"
 	destination_address_prefix = "10.0.0.0/16"
 	access = "Allow"
 }