github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/avd_docs/azure/network/AVD-AZU-0047/Terraform.md (about) 1 2 Set a more restrictive cidr range 3 4 ```hcl 5 resource "azurerm_network_security_rule" "good_example" { 6 direction = "Inbound" 7 destination_address_prefix = "10.0.0.0/16" 8 access = "Allow" 9 } 10 ``` 11 ```hcl 12 resource "azurerm_network_security_rule" "allow_lb_prober" { 13 direction = "Inbound" 14 access = "Allow" 15 protocol = "Tcp" # Probes are always TCP 16 source_port_range = "*" 17 destination_port_ranges = "443" 18 source_address_prefix = "168.63.129.16" // single public IP (Azure well known) 19 } 20 ``` 21 22 #### Remediation Links 23 - https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/network_security_rule 24