-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[AVM Module Feature Request]: Include Network Security Groups and Appropriate Rules #84
Comments
Warning Tagging the AVM Core Team (@Azure/avm-core-team-technical-terraform) due to a module owner or contributor having not responded to this issue within 3 business days. The AVM Core Team will attempt to contact the module owners/contributors directly. Tip
|
Warning Tagging the AVM Core Team (@Azure/avm-core-team-technical-terraform) due to a module owner or contributor having not responded to this issue within 3 business days. The AVM Core Team will attempt to contact the module owners/contributors directly. Tip
|
Caution **This issue requires the AVM Core Team's (@Azure/avm-core-team-technical-terraform) immediate attention as it hasn't been responded to within 6 business days. ** Tip
|
Warning Tagging the AVM Core Team (@Azure/avm-core-team-technical-terraform) due to a module owner or contributor having not responded to this issue within 3 business days. The AVM Core Team will attempt to contact the module owners/contributors directly. Tip
|
Caution **This issue requires the AVM Core Team's (@Azure/avm-core-team-technical-terraform) immediate attention as it hasn't been responded to within 6 business days. ** Tip
|
Warning Tagging the AVM Core Team (@Azure/avm-core-team-technical-terraform) due to a module owner or contributor having not responded to this issue within 3 business days. The AVM Core Team will attempt to contact the module owners/contributors directly. Tip
|
Caution **This issue requires the AVM Core Team's (@Azure/avm-core-team-technical-terraform) immediate attention as it hasn't been responded to within 6 business days. ** Tip
|
Warning Tagging the AVM Core Team (@Azure/avm-core-team-technical-terraform) due to a module owner or contributor having not responded to this issue within 3 business days. The AVM Core Team will attempt to contact the module owners/contributors directly. Tip
|
Caution **This issue requires the AVM Core Team's (@Azure/avm-core-team-technical-terraform) immediate attention as it hasn't been responded to within 6 business days. ** Tip
|
Check for previous/existing GitHub issues
Issue Type?
Feature Request
(Optional) Module Version
No response
(Optional) Correlation Id
No response
Description
In an environment deployed using the Cloud Adoption Framework (CAF), the Enterprise Scale has an Azure Policy for Subnets should have a Network Security Group.
Currently, the AVM module deploys a Virtual Network (VNet) with 2 subnets, but without any Network Security Groups (NSGs).
To support a more secure architecture, please update the module to include deployment of NSGs for each subnet.
NSG Rules
It has been tested, and the "standard" out-of-the-box NSG rules work with the GitHub runner's communication needs.
However, it would be appreciated if more specific NSG rules could be provided as well, to help ensure the security of the environment (especially in government-based and regulated environments).
This should include the communication between self-hosted runners and GitHub (or Azure DevOps, subjectively), but also include any rules required for the runners to communicate to Azure for actual deployments.
The text was updated successfully, but these errors were encountered: