Back to portfolio

Case Study | Azure | Network Security

Azure NSG exposure remediation for risky inbound rules.

Designed a workflow to identify overly permissive Azure Network Security Group rules, evaluate whether they were safe to change, and support controlled remediation.

NSG Rule
Source + Port
Risk Decision
Rule Update

Challenge

Public inbound access on sensitive ports is one of the clearest cloud exposure risks, but NSG rules can be complex. A remediation workflow needs to understand source ranges, destination ports, protocol, priority, direction, and whether the rule is intentionally approved.

Approach

  • Evaluated inbound NSG rules for broad sources such as internet-wide CIDR ranges.
  • Checked risky ports and services before deciding whether a rule qualified for remediation.
  • Preserved context such as priority, description, resource group, subscription, and owner metadata.
  • Designed safe handling for allowlisted rules, business exceptions, and cases requiring human review.

Security Value

  • Created a repeatable pattern for reducing accidental public exposure in Azure.
  • Helped separate genuinely risky rules from approved or context-dependent access.
  • Made remediation decisions auditable and easier to discuss with application owners.

Production Considerations

  • Azure Resource Graph queries for broad inventory and drift detection.
  • Integration with change tickets for production NSG updates.
  • Policy reporting to show exposure trends by subscription and application team.