cis_6_2 — Ensure RDP (port 3389) is not exposed to the internet¶
Summary
Severity: Critical · Pillar: Network · Chain role: ANCHOR
Description¶
NSG inbound rules must not allow TCP port 3389 from '*' or '0.0.0.0/0'. Exposed RDP is the #1 cause of compromise for Azure Windows VMs.
Mapping¶
| Framework | Control / Reference |
|---|---|
| NIST 800-53 | SC-7 |
| NIST 800-207 | Tenet 2 - Secure communication regardless of network location |
| CIS Azure | 6.2 |
| MITRE ATT&CK Technique | T1021.001 |
| MITRE ATT&CK Tactic | Lateral Movement |
| Zero-Trust Tenet | Tenet 2 |
| Framework tags | nist-800-207, cis-azure-2.0, nist-800-53 |
Source¶
Rule defined at policies/azure/cis/networking/cis_6_2.rego.