More Info:

Ensure that no network security groups allow unrestricted inbound access on TCP and UDP port 53

Risk Level

High

Address

Security

Compliance Standards

HIPAA, HITRUST, GDPR, SOC2, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

To remediate the unrestricted DNS access issue in Azure, please follow the below steps:

Step 1: Login to the Azure portal (https://portal.azure.com/) using your credentials.

Step 2: In the left-hand side menu, click on the “Networking” option.

Step 3: Under the “Networking” menu, click on the “DNS zones” option.

Step 4: Select the DNS zone that you want to restrict access to.

Step 5: Under the “Settings” menu, click on the “Access control (IAM)” option.

Step 6: Click on the “Add” button to add a new role assignment.

Step 7: In the “Add role assignment” window, select the “Contributor” role from the “Role” dropdown menu.

Step 8: In the “Assign access to” section, select “User, group, or service principal” from the dropdown menu.

Step 9: In the “Select” field, enter the name of the user, group, or service principal that you want to restrict access to.

Step 10: Click on the “Save” button to save the changes.

By following the above steps, you can restrict access to the DNS zone and remediate the unrestricted DNS access issue in Azure.