High
EC2
Regional
Security groups should not allow ingress from 0.0.0.0/0 or ::/0 to port 3389
CIS
Description
Checks whether security groups allow ingress from 0.0.0.0/0 to port 3389.
Remediation
To comply with this control, modify security groups to ensure they do not allow ingress from 0.0.0.0/0 to port 3389 (RDP).
Steps
- Sign in to the AWS Management Console and open the EC2 console at https://console.aws.amazon.com/ec2/.
- In the navigation pane, click on 'Security Groups'.
- Select the security group you want to modify.
- In the 'Inbound rules' tab, look for rules that allow RDP traffic (port 3389) from 0.0.0.0/0.
- If such a rule exists, click on 'Edit inbound rules' and either modify the source to a more restricted IP range or delete the rule.
- Click on 'Save rules' to apply the changes.
- Verify that the security group no longer allows ingress from 0.0.0.0/0 to port 3389.
Compliance
CIS