More Info:

Ensure that no network security groups allow unrestricted inbound access on TCP port 25.

Risk Level

High

Address

Security

Compliance Standards

HITRUST, GDPR, SOC2, NISTCSF, PCIDSS, FedRAMP

Triage and Remediation

Remediation

Sure, here are the step by step instructions to remediate Unrestricted SMTP Access misconfiguration in Azure:

  1. Login to the Azure portal and navigate to the problematic resource group.

  2. In the left-hand menu, click on “Network security group”.

  3. Select the network security group that is associated with the affected resource.

  4. Click on “Inbound security rules” and then click on “Add”.

  5. In the “Add inbound security rule” page, provide the following details:

    • Source: Select “IP addresses”.
    • Source IP addresses: Enter the IP address range that you want to allow SMTP access for.
    • Destination: Select “Any”.
    • Protocol: Select “TCP”.
    • Destination port ranges: Enter “25” (SMTP port number).
    • Name: Enter a name for the rule.
    • Priority: Choose a priority number that is lower than the existing SMTP rule.
  6. Click on “Add” to create the new rule.

  7. Verify that the new rule is created successfully and the old rule is deleted.

By following these steps, you have successfully remediated the Unrestricted SMTP Access misconfiguration in Azure using the Azure console.