Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 3389 in order to protect against attackers that use brute force techniques to gain access to the Azure virtual machines associated with the NSGs. TCP port 3389 is used for secure remote GUI login to Microsoft VMs by connecting a Remote Desktop Protocol (RDP) client application with an RDP server.
This rule resolution is part of the Conformity Security & Compliance tool for Azure.
Allowing unrestricted Remote Desktop Protocol (RDP) access can increase opportunities for malicious activities such as hacking, man-in-the-middle attacks (MITM) and Pass-the-Hash (PtH) attacks.
Audit
To determine if your Azure network security groups (NSGs) allow unrestricted access on TCP port 3389 (RDP), perform the following actions:
Remediation / Resolution
To update your Azure NSG RDP rule configuration in order to restrict Remote Desktop Protocol access to specific entities such as IP addresses or IP ranges, perform the following actions:
References
- Azure Official Documentation
- Azure network security overview
- Network security groups
- Create, change, or delete a network security group
- Azure best practices for network security
- CIS Microsoft Azure Foundations
- Azure Command Line Interface (CLI) Documentation
- az mysql server
- az network nsg list
- az network nsg rule list
- az network nsg rule update