Network misconfigurations

Ensure no security groups allow ingress from 0.0.0.0/0 to Remote Desktop port (3389)

Risk Level

Informational (4)

Platform(s)

Description

Security groups provide stateful filtering of ingress and egress network traffic to AWS resources. It is recommended that no security group allows unrestricted ingress access to remote server administration ports, such as RDP to port 3389.
  • Recommended Mitigation

    Edit the security group {AwsEc2SecurityGroup} to disallow RDP traffic from 0.0.0.0/0. ## Remediation --- >1. Sign in to the AWS Management Console and open the **[EC2 console](https://console.aws.amazon.com/ec2)**. >2. In the navigation pane, under **Network & Security**, choose **Security Groups**. >3. Choose the desired security group. >4. Under **Actions** drop-down list choose **Edit inbound rules**. >5. Find the RDP rule, and execute **one** of the following: >- Replace 0.0.0.0/0 with another source. >- Delete the rule - Choose **Delete** at the end of the rule's row. >6. Choose **Save rules**.