Skip to content

Commit 9e39c28

Browse files
skip: Merge pull request #16 from epam/feature/update_non-compatible_048_049_052_119_120_121_122_123_124_125_126_127_128_129_130_131_142
Feature/update non compatible 048 049 052 119 120 121 122 123 124 125 126 127 128 129 130 131 142
2 parents 302344e + 741b501 commit 9e39c28

20 files changed

+349
-125
lines changed

non-compatible-policies/ecc-azure-142-asb_vm_net_ports_restrict.yml

Lines changed: 0 additions & 28 deletions
This file was deleted.

non-compatible-policies/ecc-azure-048-cis_net_rdp.yml renamed to policies/ecc-azure-048-cis_net_rdp.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,22 @@ policies:
1111
Network Security Group with inbound rule that allows RDP traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '3389'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '3389'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '3389'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '3389'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'

non-compatible-policies/ecc-azure-049-cis_net_ssh.yml renamed to policies/ecc-azure-049-cis_net_ssh.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,22 @@ policies:
1111
Network Security Group with inbound rule that allows SSH traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '22'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '22'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '22'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '22'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'

non-compatible-policies/ecc-azure-052-cis_net_udp.yml renamed to policies/ecc-azure-052-cis_net_udp.yml

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,20 @@ policies:
1111
Network Security Group with inbound rule that allows UDP traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ipProtocol: 'UDP'
18-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ipProtocol: 'UDP'
19+
source: '*'
20+
- type: ingress
21+
match: any
22+
access: 'Allow'
23+
ipProtocol: 'UDP'
24+
source: 'Internet'
25+
- type: ingress
26+
match: any
27+
access: 'Allow'
28+
ipProtocol: 'UDP'
29+
source: '0.0.0.0/0'
30+

non-compatible-policies/ecc-azure-119-nsg_all.yml renamed to policies/ecc-azure-119-nsg_all.yml

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,23 @@ policies:
1111
Network Security Group with inbound rule that allows all traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: all
16-
access: 'Allow'
17-
ports: '0-65535'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: all
17+
access: 'Allow'
18+
ports: '0-65535'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: all
23+
access: 'Allow'
24+
ports: '0-65535'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: all
29+
access: 'Allow'
30+
ports: '0-65535'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'
33+

non-compatible-policies/ecc-azure-120-nsg_dns.yml renamed to policies/ecc-azure-120-nsg_dns.yml

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,23 @@ policies:
1111
Network Security Group with inbound rule that allows DNS traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '53'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '53'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '53'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '53'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'
33+

non-compatible-policies/ecc-azure-121-nsg_ftp.yml renamed to policies/ecc-azure-121-nsg_ftp.yml

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,23 @@ policies:
1111
Network Security Group with inbound rule that allows FTP traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '21'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '21'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '21'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '21'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'
33+

non-compatible-policies/ecc-azure-122-cis_nsg_http.yml renamed to policies/ecc-azure-122-cis_nsg_http.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,22 @@ policies:
1111
Network Security Group with inbound rule that allows HTTP traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '80'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '80'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '80'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '80'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'

non-compatible-policies/ecc-azure-123-nsg_microsoft_ds.yml renamed to policies/ecc-azure-123-nsg_microsoft_ds.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,22 @@ policies:
1111
Network Security Group with inbound rule that allows SMB traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '445'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '445'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '445'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '445'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'

non-compatible-policies/ecc-azure-124-nsg_mongo_db.yml renamed to policies/ecc-azure-124-nsg_mongo_db.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,22 @@ policies:
1111
Network Security Group with inbound rule that allows MySQL traffic from the Internet
1212
resource: azure.networksecuritygroup
1313
filters:
14-
- type: ingress
15-
match: any
16-
access: 'Allow'
17-
ports: '27017'
18-
ipProtocol: 'TCP'
19-
sourceAddress: ['*', 'Internet', '0.0.0.0/0']
14+
- or:
15+
- type: ingress
16+
match: any
17+
access: 'Allow'
18+
ports: '27017'
19+
ipProtocol: 'TCP'
20+
source: '*'
21+
- type: ingress
22+
match: any
23+
access: 'Allow'
24+
ports: '27017'
25+
ipProtocol: 'TCP'
26+
source: 'Internet'
27+
- type: ingress
28+
match: any
29+
access: 'Allow'
30+
ports: '27017'
31+
ipProtocol: 'TCP'
32+
source: '0.0.0.0/0'

0 commit comments

Comments
 (0)