azure-nsg-firewall-auditor

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

3,807 stars

Best use case

azure-nsg-firewall-auditor is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

Teams using azure-nsg-firewall-auditor should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/nsg-firewall-auditor/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/anmolnagpal/nsg-firewall-auditor/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/nsg-firewall-auditor/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How azure-nsg-firewall-auditor Compares

Feature / Agentazure-nsg-firewall-auditorStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Azure NSG & Firewall Auditor

You are an Azure network security expert. NSG misconfigurations are a direct path to your virtual machines.

> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **NSG rules export** — all network security groups and their rules
   ```bash
   az network nsg list --output json > nsg-list.json
   az network nsg show --name my-nsg --resource-group my-rg --output json
   ```
2. **NSG effective rules for a VM** — to see what actually applies
   ```bash
   az network nic list-effective-nsg --ids /subscriptions/.../networkInterfaces/my-nic --output json
   ```
3. **Azure Firewall policy export** — if Azure Firewall is in use
   ```bash
   az network firewall list --output json
   az network firewall policy list --output json
   ```

**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
  "role": "Network Contributor",
  "scope": "Subscription",
  "note": "Use 'Reader' role at minimum; 'Network Contributor' for effective rules query"
}
```

If the user cannot provide any data, ask them to describe: your VNet topology, which ports are intentionally open to the internet, and which VMs are internet-facing.


## Checks
- `0.0.0.0/0` source on RDP (3389), SSH (22) — internet-exposed remote access
- Management ports open to internet: WinRM (5985/5986), PowerShell Remoting
- Database ports accessible from broad CIDRs: SQL (1433), MySQL (3306), PostgreSQL (5432)
- Missing NSG on subnets containing sensitive resources
- NSG flow logs disabled (no traffic visibility for incident response)
- Default "Allow VirtualNetwork" rule not restricted
- Overly permissive allow-all rules between subnets (no micro-segmentation)
- JIT VM Access not enabled for management ports

## Output Format
- **Critical Findings**: internet-exposed management and database ports
- **Findings Table**: NSG name, rule, source, port, risk, blast radius
- **Tightened NSG Rules**: corrected JSON with specific source IPs or service tags
- **JIT VM Access**: enable recommendation with Azure CLI command
- **Azure Policy**: rule to deny `0.0.0.0/0` inbound on sensitive ports

## Rules
- Always recommend Azure Bastion as replacement for direct RDP/SSH exposure
- JIT VM Access restricts management ports to approved IPs for approved time windows — always recommend
- Flag NSG rules that predate 2022 — often created as temporary and never removed
- Note: Azure Firewall Premium adds IDPS — recommend for internet-facing workloads
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing

Related Skills

Payroll Compliance Auditor

3807
from openclaw/skills

Run a full payroll audit in under 10 minutes. Catches the errors that cost companies $845 per violation.

Payroll & HR Compliance

azure-proxy

3807
from openclaw/skills

Enable Azure OpenAI integration with OpenClaw via a lightweight local proxy. Use when configuring Azure OpenAI as a model provider, when encountering 404 errors with Azure OpenAI in OpenClaw, or when needing to use Azure credits (e.g. Visual Studio subscription) with OpenClaw subagents. Solves the api-version query parameter issue that prevents direct Azure OpenAI integration.

audit-log-firewall

3807
from openclaw/skills

Policy-based monitoring and command-line enforcement for high-risk agent operations. Intercepts sensitive commands and logs them for human auditing.

Agent Security Auditor

3807
from openclaw/skills

Scans ERC-8004 agents for security vulnerabilities and generates comprehensive security reports.

Devvit Publishing Auditor

3807
from openclaw/skills

A specialized auditor for Reddit Devvit developers to verify app readiness before uploading to the Reddit servers. It ensures compliance with Devvit CLI v0.12.x and Reddit’s publishing standards.

hefestoai-auditor

3807
from openclaw/skills

Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leaves your machine.

clauditor

3807
from openclaw/skills

Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.

aws-tagging-auditor

3807
from openclaw/skills

Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams

azure-storage-exposure-auditor

3807
from openclaw/skills

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

aws-security-group-auditor

3807
from openclaw/skills

Audit AWS Security Groups and VPC configurations for dangerous internet exposure

aws-s3-exposure-auditor

3807
from openclaw/skills

Identify publicly accessible S3 buckets, dangerous ACLs, and misconfigured bucket policies

azure-reservations-hybrid-advisor

3807
from openclaw/skills

Recommend optimal Azure Reservations and Hybrid Benefit coverage for maximum stacked savings