๐ก๏ธ Oracle IAAS Security List allows unrestricted RDP traffic๐ข
- Contextual name: ๐ก๏ธ IAAS Security List allows unrestricted RDP traffic๐ข
- ID:
/ce/ca/oracle/compute/security-list-allows-unrestricted-rdp-traffic - Tags:
- ๐ข Policy with categories
- ๐ข Policy with type
- ๐ข Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicโ
- ๐ง prod.logic.yaml๐ข
Similar Policiesโ
- Internal:
dec-x-afca7c62
Similar Internal Rulesโ
| Rule | Policies | Flags |
|---|---|---|
| โ๏ธ dec-x-afca7c62 | 1 |
Descriptionโ
Descriptionโ
This policy identifies Oracle IAAS Security Lists that allow unrestricted ingress from the internet to the Remote Desktop Protocol (RDP) port,
TCP/3389.Rationaleโ
RDP is commonly used to administer Windows workloads. Allowing RDP access from
0.0.0.0/0or::/0exposes administrative interfaces to internet-wide scanning, brute-force attempts, credential stuffing, and exploitation of vulnerable remote access services. Security list rules should allow RDP only from trusted administrative networks, bastion hosts, VPN ranges, or other controlled access paths.Impactโ
Restricting public RDP ingress can block administrative connections that currently depend on open internet access. Confirm that administrators have an approved access path before removing or narrowing existing rules.
Auditโ
This policy flags an Oracle IAAS Security List as
INCOMPLIANTwhen it has at least one related rule that meets all of the following conditions:
Directionis Ingress.Sourceis 0.0.0.0/0 or ::/0.... see more
Remediationโ
Remediationโ
Restrict Public RDP Accessโ
From OCI CLIโ
Review the current ingress rules before updating the security list:
oci network security-list get \
--security-list-id {{security-list-ocid}}Update the security list with a revised ingress rule set that removes public RDP access or restricts RDP to trusted source CIDRs:
oci network security-list update \
--security-list-id {{security-list-ocid}} \
--ingress-security-rules file://ingress-rules.jsonThe
ingress-rules.jsonfile must contain the complete intended ingress rule set for the security list. Preserve required business traffic and replace any RDP rule sourced from0.0.0.0/0or::/0with narrowly scoped CIDR ranges.