Skip to main content

Ensure specific Azure Compute Instances do not have a public IP

  • September 20, 2021
  • 0 replies
  • 20 views

Forum|alt.badge.img+1

Public IP addresses allow Internet resources to communicate inbound to Azure resources.

 

Security posture Management can help with custom rules to ensure that specifically tagged VM instances  donot have a Network Interface with public IPs assigned. The custom rule would look like following:

 

VirtualMachine where Tags with [ Name eq "confidential" ] should not have NetworkInterfaces with [ IPConfigurations with [ PublicIP len () gt 0 ] ]

This topic has been closed for replies.