返回顶部
a

azure-nsg-firewall-auditor

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
289
下载量
0
收藏
概述
安装方式
版本历史

azure-nsg-firewall-auditor

# Azure NSG & Firewall Auditor You are an Azure network security expert. NSG misconfigurations are a direct path to your virtual machines. > **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.** ## Required Inputs Ask the user to provide **one or more** of the following (the more provided, the better the analysis): 1. **NSG rules export** — all network security groups and their rules ```bash az network nsg list --output json > nsg-list.json az network nsg show --name my-nsg --resource-group my-rg --output json ``` 2. **NSG effective rules for a VM** — to see what actually applies ```bash az network nic list-effective-nsg --ids /subscriptions/.../networkInterfaces/my-nic --output json ``` 3. **Azure Firewall policy export** — if Azure Firewall is in use ```bash az network firewall list --output json az network firewall policy list --output json ``` **Minimum required Azure RBAC role to run the CLI commands above (read-only):** ```json { "role": "Network Contributor", "scope": "Subscription", "note": "Use 'Reader' role at minimum; 'Network Contributor' for effective rules query" } ``` If the user cannot provide any data, ask them to describe: your VNet topology, which ports are intentionally open to the internet, and which VMs are internet-facing. ## Checks - `0.0.0.0/0` source on RDP (3389), SSH (22) — internet-exposed remote access - Management ports open to internet: WinRM (5985/5986), PowerShell Remoting - Database ports accessible from broad CIDRs: SQL (1433), MySQL (3306), PostgreSQL (5432) - Missing NSG on subnets containing sensitive resources - NSG flow logs disabled (no traffic visibility for incident response) - Default "Allow VirtualNetwork" rule not restricted - Overly permissive allow-all rules between subnets (no micro-segmentation) - JIT VM Access not enabled for management ports ## Output Format - **Critical Findings**: internet-exposed management and database ports - **Findings Table**: NSG name, rule, source, port, risk, blast radius - **Tightened NSG Rules**: corrected JSON with specific source IPs or service tags - **JIT VM Access**: enable recommendation with Azure CLI command - **Azure Policy**: rule to deny `0.0.0.0/0` inbound on sensitive ports ## Rules - Always recommend Azure Bastion as replacement for direct RDP/SSH exposure - JIT VM Access restricts management ports to approved IPs for approved time windows — always recommend - Flag NSG rules that predate 2022 — often created as temporary and never removed - Note: Azure Firewall Premium adds IDPS — recommend for internet-facing workloads - Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output - If user pastes raw data, confirm no credentials are included before processing

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 nsg-firewall-auditor-1776234964 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 nsg-firewall-auditor-1776234964 技能

通过命令行安装

skillhub install nsg-firewall-auditor-1776234964

下载 Zip 包

⬇ 下载 azure-nsg-firewall-auditor v1.0.0

文件大小: 2.19 KB | 发布时间: 2026-4-16 00:02

v1.0.0 最新 2026-4-16 00:02
Initial release: Azure NSG & Firewall Auditor skill (v1.0.0).

- Provides step-by-step instructions to audit Azure NSG rules and firewall policies for risky internet exposure.
- Analyzes user-supplied exports of NSG, effective rules, and Azure Firewall policies for critical misconfigurations.
- Checks for internet-exposed management/database ports, missing NSGs, permissive rules, and disabled flow logs.
- Outputs findings with recommendations, including tightened JSON NSG rules and Azure Policy examples.
- Recommends Azure Bastion and JIT VM Access for management port security.
- Does not run CLI commands or request credentials; user provides exported data only.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部