Check your Oracle Cloud Infrastructure (OCI) security lists for inbound rules that allow unrestricted access (i.e. 0.0.0.0/0) on TCP port 3389 and limit the access to trusted IP addresses or IP ranges only in order to implement the Principle of Least Privilege (POLP) and reduce the attack surface. TCP port 3389 is used for secure remote GUI login to Windows VM instances by connecting an RDP client application with an RDP server.
Exposing TCP port 3389 (Remote Desktop Protocol - RDP) to the Internet can increase opportunities for malicious activities such as hacking, Man-In-The-Middle (MITM) attacks, and brute-force attacks. Therefore, it is strongly recommended to configure your OCI security lists to limit inbound traffic on TCP port 3389 to known and trusted IP addresses only.
Audit
To determine if your Oracle Cloud Infrastructure (OCI) security lists allow unrestricted access on TCP port 3389 (RDP), perform the following operations:
Remediation / Resolution
To update the inbound rule configuration for your Oracle Cloud Infrastructure (OCI) security lists in order to limit RDP access to trusted entities only (i.e., authorized IP addresses and IP address ranges) or to remove the non-compliant rule entirely, perform the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Getting Details for a Security List
- Working with Security Lists
- Updating Rules in a Security List
- Oracle Cloud Infrastructure CLI Documentation
- structured-search
- security-list update