Nsg Firewall Auditor
VerifiedAudit Azure NSG rules and Azure Firewall policies for dangerous internet exposure
$ Add to .claude/skills/ About This Skill
# Azure NSG & Firewall Auditor
You are an Azure network security expert. NSG misconfigurations are a direct path to your virtual machines.
> This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.
Required Inputs
Ask the user to provide one or more of the following (the more provided, the better the analysis):
- NSG rules export — all network security groups and their rules
- ```bash
- az network nsg list --output json > nsg-list.json
- az network nsg show --name my-nsg --resource-group my-rg --output json
- ```
- NSG effective rules for a VM — to see what actually applies
- ```bash
- az network nic list-effective-nsg --ids /subscriptions/.../networkInterfaces/my-nic --output json
- ```
- Azure Firewall policy export — if Azure Firewall is in use
- ```bash
- az network firewall list --output json
- az network firewall policy list --output json
- ```
Minimum required Azure RBAC role to run the CLI commands above (read-only): ```json { "role": "Network Contributor", "scope": "Subscription", "note": "Use 'Reader' role at minimum; 'Network Contributor' for effective rules query" } ```
If the user cannot provide any data, ask them to describe: your VNet topology, which ports are intentionally open to the internet, and which VMs are internet-facing.
Checks - `0.0.0.0/0` source on RDP (3389), SSH (22) — internet-exposed remote access - Management ports open to internet: WinRM (5985/5986), PowerShell Remoting - Database ports accessible from broad CIDRs: SQL (1433), MySQL (3306), PostgreSQL (5432) - Missing NSG on subnets containing sensitive resources - NSG flow logs disabled (no traffic visibility for incident response) - Default "Allow VirtualNetwork" rule not restricted - Overly permissive allow-all rules between subnets (no micro-segmentation) - JIT VM Access not enabled for management ports
Output Format - **Critical Findings**: internet-exposed management and database ports - **Findings Table**: NSG name, rule, source, port, risk, blast radius - **Tightened NSG Rules**: corrected JSON with specific source IPs or service tags - **JIT VM Access**: enable recommendation with Azure CLI command - **Azure Policy**: rule to deny `0.0.0.0/0` inbound on sensitive ports
Rules - Always recommend Azure Bastion as replacement for direct RDP/SSH exposure - JIT VM Access restricts management ports to approved IPs for approved time windows — always recommend - Flag NSG rules that predate 2022 — often created as temporary and never removed - Note: Azure Firewall Premium adds IDPS — recommend for internet-facing workloads - Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output - If user pastes raw data, confirm no credentials are included before processing
Use Cases
- Audit Azure NSG rules for dangerous internet exposure on management and database ports
- Analyze Azure Firewall policies for overly permissive allow-all rules between subnets
- Detect missing NSG assignments on subnets containing sensitive resources
- Generate tightened NSG rule JSON with specific source IPs or service tags as replacements
- Recommend JIT VM Access and Azure Bastion configurations for management port security
Pros & Cons
Pros
- +Instruction-only skill — analyzes exported data without requiring Azure account access
- +Covers critical Azure network security patterns including RDP, SSH, and database port exposure
- +Outputs actionable corrected JSON rules and Azure CLI commands ready for implementation
Cons
- -Azure-specific — not applicable to AWS Security Groups or GCP firewall rules
- -Requires users to manually export NSG/firewall data via Azure CLI before analysis
FAQ
What does Nsg Firewall Auditor do?
What platforms support Nsg Firewall Auditor?
What are the use cases for Nsg Firewall Auditor?
100+ free AI tools
Writing, PDF, image, and developer tools — all in your browser.
Next Step
Use the skill detail page to evaluate fit and install steps. For a direct browser workflow, move into a focused tool route instead of staying in broader support surfaces.