Skip to content

cis_6_1 — Ensure SSH (port 22) is not exposed to the internet

Summary

Severity: Critical · Pillar: Network · Chain role: ANCHOR

Description

NSG inbound rules must not allow TCP port 22 from '*' or '0.0.0.0/0'. Exposed SSH is the #1 cause of compromise for Azure Linux VMs.

Mapping

Framework Control / Reference
NIST 800-53 SC-7
NIST 800-207 Tenet 2 - Secure communication regardless of network location
CIS Azure 6.1
MITRE ATT&CK Technique T1021.004
MITRE ATT&CK Tactic Lateral Movement
Zero-Trust Tenet Tenet 2
Framework tags nist-800-207, cis-azure-2.0, nist-800-53

Source

Rule defined at policies/azure/cis/networking/cis_6_1.rego.

View on GitHub