Sola Security raised $35M Series A Read all about it

How to identify unrestricted Azure network access?

TL;DR

Find and fix overly permissive NSG rules

To identify unrestricted Azure network security exposure, start by auditing your NSGs in Azure for rules that allow traffic from any source (e.g., 0.0.0.0/0), allow all destination ports, or lack protocol restrictions. Focus especially on rules with low priority values that override safer defaults.

With Sola, you can build an app that pulls a full inventory of your Azure network security groups, flags high-risk or overly permissive rules, and tracks changes to security group configurations over time, across subscriptions and environments.

How to find overly permissive Azure NSG rules

1. Filter for “Allow” rules with 0.0.0.0/0

Any rule that allows inbound access from all IP addresses (0.0.0.0/0) deserves extra scrutiny, especially when applied to critical services. Combine that with destination port ranges like * or common ports (22, 3389, 1433), and you’ve likely got an exposure risk.

2. Review NSG priority and rule conflicts

Azure NSG priority determines which rule gets enforced. Lower numbers take precedence. That means a broad allow rule with a priority of 100 overrides a deny rule set at 300. Check for misordered or conflicting rules that unintentionally open access.

3. Map rules to actual resources

Once your NSG rules are configured and visible, it’s important to understand where they’re actually applied. Tie each Azure security group to the subnet or VM it’s protecting, so you understand the real impact. Pay attention to Azure application security groups if you’re segmenting by workload type.

How misconfigured NSGs quietly expose your Azure environment

A network security group (NSG) in Azure is a firewall that controls inbound and outbound traffic at the subnet or NIC level. It works by applying NSG rules. Each rule defines access based on IP ranges, ports, and protocols, with a priority value determining which rules win when conflicts exist.

But just “having audit logging enabled” isn’t enough. Logs need to be correctly routed, stored, and retained long enough to support investigations or compliance checks. This is where most setups fall short.

Monitor Azure network security with Sola

Sola helps you build a tailored app that shows you exactly where NSGs are misconfigured, what rules are too open, and which resources are exposed. Simply ask Sola’s AI assistant to identify overly permissive NGS rules in your Azure environment and you’ll be able to set up an app, based on your data.

You can also set up alerts to track changes to NSG configurations and enforce best practices across all environments.

Answer more security questions