<  Back to rules search

RDP access is restricted from the Internet

azure.security

Set up the azure.security integration.

Description

Disable RDP access on network security groups from the internet.

Rationale

The potential security problem with using RDP over the internet is that attackers can use various brute force techniques to access Azure Virtual Machines. Once the attackers gain access, they can use a virtual machine as a launch point for compromising other machines on an Azure Virtual Network or even attack networked devices outside of Azure.

Remediation

Disable direct RDP access to your Azure Virtual Machines from the internet. After direct RDP access from the internet is disabled, you have other options you can use to access these virtual machines for remote management.

References

  1. https://docs.microsoft.com/en-us/azure/security/azure-security-network-security-best-practices#disable-rdpssh-access-to-azure-virtual-machines
  2. https://docs.microsoft.com/en-us/azure/security/benchmarks/security-controls-v2-network-security#ns-1-implement-security-for-internal-traffic

CIS Controls

Version 7 9.2 Ensure Only Approved Ports, Protocols and Services Are Running: Ensure that only network ports, protocols, and services listening on a system with validated business needs, are running on each system.