MEDIUM
Source
CloudSploit
ID
monitor-nsg-enabled

Monitor NSG Enabled

Ensures Network Security Groups monitoring is enabled in Security Center

When this setting is enabled, Security Center will audit the Network Security Groups that are enabled on the VM for permissive rules.

Follow the appropriate remediation steps below to resolve the issue.

  1. Log into the Microsoft Azure Management Console.

  2. Select the “Search resources, services, and docs” option at the top and search for Security Center. Step

  3. Scroll down the “Security Center” and select the “Security policy” option under the “Management” on left navigation panel.

  4. On the “Policy Management” page under “Name” column select the “Subscription Name” that needs to be verified.Step

  5. In the “Security Policy” page scroll down and click on the “Azure Security Benchmark”.Step

  6. In the “Azure Security Benchmark” click on the Next button.Step

  7. In the “Azure Security Benchmark”, check for the “Internet-facing virtual machines should be protected with network security groups” Parameter and if it’s set to “Disable” then the encryption is not enabled.Step

  8. Repeat steps number 2 - 7 to check other “Subscriptions” under the “Security Center."

  9. Navigate to the “Security Center”, select the “Security policy” and under “Policy Management” seelct the “Subscription” that needs to enable the “Monitor network security groups setting.”Step

  10. Select the “Subscription” link under the “Security policy” at the top to get into the configuration settings. Step

  11. Scroll down the page and under “Parameter” choose the “Internet-facing virtual machines should be protected with network security groups” and select the “AuditIfNotExists” option from the dropdown menu and click on the “Save” button at the bottom to make the necessary changes.Step

  12. Repeat steps number 9 - 11 to ensure Network Security Group monitoring is configured from the Azure Security Center.