π Google GCE Network has Firewall Rules which allow unrestricted RDP access from the Internet π’
- Contextual name: π GCE Network has Firewall Rules which allow unrestricted RDP access from the Internet π’
- ID:
/ce/ca/google/vpc/network-rdp-access
- Located in: π Google VPC
Flagsβ
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
Our Metadataβ
- Policy Type:
COMPLIANCE_POLICY
- Policy Category:
SECURITY
Similar Policiesβ
- Cloud Conformity
Logicβ
- π§ prod.logic.yaml π’
Descriptionβ
Descriptionβ
GCP
Firewall Rules
are specific to aVPC Network
. Each rule eitherallows
ordenies
traffic when its conditions are met. Its conditions allow users to specify the type of traffic, such as ports and protocols, and the source or destination of the traffic, including IP addresses, subnets, and instances.Firewall rules are defined at the VPC network level and are specific to the network in which they are defined. The rules themselves cannot be shared among networks. Firewall rules only support IPv4 traffic. When specifying a source for an ingress rule or a destination for an egress rule by address, an
IPv4
address orIPv4 block in CIDR
notation can be used. Generic(0.0.0.0/0)
incoming traffic from the Internet to a VPC or VM instance usingRDP
onPort 3389
can be avoided.Rationaleβ
GCP
Firewall Rules
within aVPC Network
. These rules apply to outgoing (egress) traffic from instances and incoming (ingress) traffic to instances in the network. Egress and ingress traffic flows are controlled even if the traffic stays within the network (for example, instance-to-instance communication). For an instance to have outgoing Internet access, the network must have a valid Internet gateway route or custom route whose destination IP is specified. This route simply defines the path to the Internet, to avoid the most general(0.0.0.0/0)
destinationIP Range
specified from the Internet throughRDP
with the defaultPort 3389
. Generic access from the Internet to a specific IP Range should be restricted.... see more
Remediationβ
Remediationβ
From Google Cloud Consoleβ
- Go to
VPC Network
.- Go to the
Firewall Rules
.- Click the
Firewall Rule
to be modified.- Click
Edit
.- Modify
Source IP ranges
to specificIP
.- Click
Save
.From Google Cloud CLIβ
1.Update RDP Firewall rule with new
SOURCE_RANGE
from the below command:gcloud compute firewall-rules update FirewallName --allow=[PROTOCOL[:PORT[-PORT]],...] --source-ranges=[CIDR_RANGE,...]
policy.yamlβ
Linked Framework Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ CIS GCP v3.0.0 β πΌ 3.7 Ensure That RDP Access Is Restricted From the Internet - Level 2 (Automated) | 1 | |||
πΌ Cloudaware Framework β πΌ Secure Access | 43 |