Get Involved
Query: Flow logs should be configured for every network security group
Description
Audit for network security groups to verify if flow logs are configured. Enabling flow logs allows to log information about IP traffic flowing through network security group. It can be used for optimizing network flows, monitoring throughput, verifying compliance, detecting intrusions and more.
Query
Tables used in this query:
Controls using this query: