Network security group rules should not allow unrestricted inbound RDP access

이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Description

Network security groups provide filtering of ingress and egress network traffic to OCI resources at the VNIC level. It is recommended that no network security group allows unrestricted ingress access to TCP port 3389 from 0.0.0.0/0 (IPv4) or ::/0 (IPv6). Removing unrestricted connectivity to remote console services, such as Remote Desktop Protocol (RDP), reduces a server’s exposure to risk.

Remediation

Remove or modify ingress security rules that allow RDP access from 0.0.0.0/0 (IPv4) or ::/0 (IPv6). Instead, restrict RDP access to specific IP ranges or use VPN connections. For guidance on configuring network security groups, refer to the Network Security Groups section of the Oracle Cloud Infrastructure documentation.