More Info:

Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 3389 in order to protect against attackers that use brute force techniques to gain access to the Azure virtual machines associated with the NSGs. TCP port 3389 is used for secure remote GUI login to Microsoft VMs by connecting a Remote Desktop Protocol (RDP) client application with an RDP server.

Risk Level

High

Address

Security

Compliance Standards

CISAZURE, CBP, SOC2, PCIDSS, ISO27001, HIPAA, HITRUST, GDPR, NISTCSF, FedRAMP

Triage and Remediation

Remediation

To remediate the unrestricted RDP access issue in Azure, you can follow the below steps:

  1. Login to the Azure portal (https://portal.azure.com/)
  2. Select the virtual machine that has unrestricted RDP access.
  3. Click on the “Networking” option from the left-hand side menu.
  4. Under the “Inbound port rules” section, click on “Add inbound port rule”.
  5. In the “Add inbound security rule” blade, provide the following details:
    • Name: Enter a name for the rule (e.g. RDP Restricted)
    • Priority: Set a priority number for the rule (e.g. 100)
    • Source: Select “IP Addresses” and enter the IP address range that you want to allow RDP access from. If you want to allow RDP access from a specific IP address, enter that IP address.
    • Protocol: Select “TCP”
    • Destination port ranges: Enter “3389”
    • Action: Select “Allow”
    • Description: Enter a description for the rule (optional)
  6. Click on “Add” to create the rule.
  7. Once the rule is created, delete the existing rule that allows unrestricted RDP access.
  8. To delete the existing rule, click on the rule in the “Inbound port rules” section, and then click on the “Delete” button.

By following these steps, you can remediate the unrestricted RDP access issue in Azure.