/
VM Image Builder Templates Should Use Private Link
VM Image Builder Templates Should Use Private Link
Description:
Audit VM Image Builder templates that do not have a virtual network configured. When a virtual network is not configured, a public IP is created and used instead, which may directly expose resources to the internet and increase the potential attack surface.
Solution/Reference:
To enable private link connection when building VM Image Builder templates, add vnetConfig to templates.
For details, see http://aka.ms/azvmimagebuildertmplref.
, multiple selections available,
Related content
Non-Internet-Facing Virtual Machines Should Be Protected With Network Security Groups
Non-Internet-Facing Virtual Machines Should Be Protected With Network Security Groups
More like this
All Network Ports Should Be Restricted on Network Security Groups Associated to Your Virtual Machine
All Network Ports Should Be Restricted on Network Security Groups Associated to Your Virtual Machine
More like this
Internet-Facing Virtual Machines Should Be Protected With Network Security Groups
Internet-Facing Virtual Machines Should Be Protected With Network Security Groups
More like this
IP Forwarding on Your Virtual Machine Should Be Disabled
IP Forwarding on Your Virtual Machine Should Be Disabled
More like this
Container Registries Should Not Allow Unrestricted Network Access
Container Registries Should Not Allow Unrestricted Network Access
More like this
Virtual Machines' Guest Configuration Extension Should be Deployed with System-Assigned Managed Identity
Virtual Machines' Guest Configuration Extension Should be Deployed with System-Assigned Managed Identity
More like this