Network misconfigurations

Security Group allows ingress from ::/0 to Remote Desktop port (3389)

Risk Level

Informational (4)

Platform(s)
Compliance Frameworks

Description

Security groups provide stateful filtering of ingress and egress network traffic to AWS resources. Public access to remote server administration ports, such as 22 and 3389, increases resource attack surface and unnecessarily raises the risk of resource compromise.It is advised that no security group {AwsEc2SecurityGroup} allows unrestricted ingress access to remote server administration ports, such as RDP to port 3389.
  • Recommended Mitigation

    Edit the security group {AwsEc2SecurityGroup} to disallow RDP traffic from ::/0.