Plugin Title Open CIFS
Cloud GOOGLE
Category VPC Network
Description Determines if UDP port 445 for CIFS is open to the public
More Info While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as CIFS should be restricted to known IP addresses.
AWS Link https://cloud.google.com/vpc/docs/using-firewalls
Recommended Action Restrict UDP port 445 to known IP addresses.


Detailed Remediation Steps

  1. Log into the Google Cloud Platform Console.
  2. Scroll down the left navigation panel and choose the "Networking" to select the "Firewall rules" option under the "VPC network."
  3. On the "Firewall rules" page, select the "Firewall rule" which needs to be verified.
  4. On the selected "Firewall rules", if "UDP port 445 for CIFS" is open to the public then the selected "Firewall rule" is not as per the best standards.
  5. Repeat steps number 2 - 4 to verify another "Firewall rule" in the network.
  6. Navigate to "VPC network" and choose the "Firewall rules" option under the "Networking" and select the "Firewall rule" which needs to be restricted to known IP addresses for UDP port 445 for CIFS.
  7. On the "Firewall rules" page, click on the "Edit" button at the top and enter the "Source IP ranges" and enter the "IP Address".
  8. Click on the "Save" button at the bottom to make the changes.
  9. Repeat steps number 6 - 8 to restrict UDP port 445 to known IP addresses.

Want to scan for this risk automatically?

Get Started Now