Skip to content

cis_6_2 — Ensure RDP (port 3389) is not exposed to the internet

Summary

Severity: Critical · Pillar: Network · Chain role: ANCHOR

Description

NSG inbound rules must not allow TCP port 3389 from '*' or '0.0.0.0/0'. Exposed RDP is the #1 cause of compromise for Azure Windows VMs.

Mapping

Framework Control / Reference
NIST 800-53 SC-7
NIST 800-207 Tenet 2 - Secure communication regardless of network location
CIS Azure 6.2
MITRE ATT&CK Technique T1021.001
MITRE ATT&CK Tactic Lateral Movement
Zero-Trust Tenet Tenet 2
Framework tags nist-800-207, cis-azure-2.0, nist-800-53

Source

Rule defined at policies/azure/cis/networking/cis_6_2.rego.

View on GitHub