π‘οΈ Oracle IAAS Security List allows unrestricted SSH trafficπ’
- Contextual name: π‘οΈ IAAS Security List allows unrestricted SSH trafficπ’
- ID:
/ce/ca/oracle/compute/security-list-allows-unrestricted-ssh-traffic - Tags:
- π’ Policy with categories
- π’ Policy with type
- π’ Production policy
- Policy Type:
COMPLIANCE_POLICY - Policy Categories:
SECURITY
Logicβ
- π§ prod.logic.yamlπ’
Similar Policiesβ
- Internal:
dec-x-fab5c4cd
Similar Internal Rulesβ
| Rule | Policies | Flags |
|---|---|---|
| βοΈ dec-x-fab5c4cd | 1 |
Descriptionβ
Descriptionβ
This policy identifies Oracle IAAS Security Lists that allow unrestricted ingress from the internet to the Secure Shell (SSH) port,
TCP/22.Rationaleβ
SSH is commonly used to administer Linux workloads and other networked systems. Allowing SSH access from
0.0.0.0/0or::/0exposes administrative interfaces to internet-wide scanning, brute-force attempts, credential stuffing, and exploitation of vulnerable SSH services. Security list rules should allow SSH only from trusted administrative networks, bastion hosts, VPN ranges, or other controlled access paths.Impactβ
Restricting public SSH ingress can block administrative connections that currently depend on open internet access. Confirm that administrators have an approved access path before removing or narrowing existing rules.
Auditβ
This policy flags an Oracle IAAS Security List as
INCOMPLIANTwhen it has at least one related rule that meets all of the following conditions:
Directionis Ingress.Sourceis 0.0.0.0/0 or ::/0.... see more
Remediationβ
Remediationβ
Restrict Public SSH Accessβ
From OCI CLIβ
Review the current ingress rules before updating the security list:
oci network security-list get \
--security-list-id {{security-list-ocid}}Update the security list with a revised ingress rule set that removes public SSH access or restricts SSH to trusted source CIDRs:
oci network security-list update \
--security-list-id {{security-list-ocid}} \
--ingress-security-rules file://ingress-rules.jsonThe
ingress-rules.jsonfile must contain the complete intended ingress rule set for the security list. Preserve required business traffic and replace any SSH rule sourced from0.0.0.0/0or::/0with narrowly scoped CIDR ranges.