More Info:

Ensure that no network security groups allow unrestricted inbound access on TCP port 443.

Risk Level

Critical

Address

Security

Compliance Standards

HITRUST, SOC2, GDPR

Triage and Remediation

Remediation

The following are the step-by-step instructions to remediate the unrestricted HTTPS access misconfiguration in Azure using the Azure console:

  1. Log in to the Azure portal (https://portal.azure.com/).

  2. Navigate to the resource group containing the virtual machine that needs to be remediated.

  3. Select the virtual machine that needs to be remediated.

  4. Click on the “Networking” tab on the left-hand side of the screen.

  5. Under the “Inbound port rules” section, click on the “Add inbound port rule” button.

  6. In the “Add inbound security rule” window, enter a name for the rule (e.g., “HTTPS Access”), select “HTTPS” as the service, and set the action to “Deny”.

  7. Under the “Source” section, select “IP Addresses” and enter the IP address range that needs to be denied access to the virtual machine.

  8. Click on the “Add” button to add the rule.

  9. Repeat steps 5-8 to add additional rules as needed for other IP address ranges.

  10. Once all the necessary rules have been added, click on the “Save” button to apply the changes.

  11. Verify that the changes have been applied by attempting to access the virtual machine via HTTPS from an IP address that has been denied access. The access should be blocked.