Network Security & Exposure
Public IPs
12
Total exposed public IP addresses.
Open Ports (High Risk)
2
Ports 22/3389 open to 0.0.0.0/0.
DNS Exposure
DMARC Fail
Missing DMARC policy on main domain.
Firewall Rules
45
Total rules configured in Azure Firewall/NSG.
Publicly Exposed Endpoints
| Resource | Public IP | Open Ports | Risk Level | Details |
|---|---|---|---|---|
| Prod-LoadBalancer | 104.215.x.x | 80, 443 | Medium | |
| SSH-JumpBox | 20.25.x.x | 22 | Critical | |
| DB-Proxy-DMZ | 192.168.1.1 | 1433 | Low |
Network Compliance Gaps
- Inbound rule allows RDP (Port 3389) access from "Any" source on NSG 'Default-NSG'.
- DNS records show weak SPF policy ("~all") increasing phishing risk.
- All network traffic segmentation is currently handled by software, lacking hardware firewall enforcement.