VMInstance with administrative service: Remote Desktop (TCP:3389) is too exposed to the public internet

A management and administration protocols allow administrators to control the configuration and operational health of services as well as the access to them. Access to management and administration applications should be restricted to prevent exploits.
This rule detects network settings that allow over permissive network access.

Risk Level: High
Cloud Entity: Virtual Machine Instances
CloudGuard Rule ID: D9.GCP.NET.AG2.4.VMInstance.3389.TCP
Covered by Spectral: No
Category: Compute

GSL LOGIC

VMInstance where isPublic=true and nics contain-any [inboundRules contain [ destinationPort<=3389 and destinationPortTo >=3389 and protocol in ('TCP','ALL')]] should not have nics contain-any [ inboundRules allowedPublicHostsForPort(3389) > 32 ]

REMEDIATION

Delete the rules that allow permissive Admin access and limit the scope only for a trusted bastion server within the network using non public IP addresses.

Virtual Machine Instances

Compute Engine instances can run the public images for Linux and Windows Server that Google provides as well as private custom images that you can create or import from your existing systems. You can also deploy Docker containers, which are automatically launched on instances running the Container-Optimized OS public image.

You can choose the machine properties of your instances, such as the number of virtual CPUs and the amount of memory, by using a set of predefined machine types or by creating your own custom machine types.

Compliance Frameworks

  • GCP CloudGuard Best Practices
  • GCP CloudGuard CheckUp
  • GCP CloudGuard Network Security
  • GCP CloudGuard SOC2 based on AICPA TSC 2017
  • GCP ISO 27001:2013
  • GCP LGPD regulation
  • GCP NIST 800-53 Rev 4
  • GCP NIST CSF v1.1
  • GCP PCI-DSS 3.2
  • GCP Risk Management
  • GCP Security Risk Management