Plugin Title Open RDP
Cloud GOOGLE
Category VPC Network
Description Determines if TCP port 3389 for RDP is open to the public
More Info While some ports such as HTTP and HTTPS are required to be open to the public to function properly, more sensitive services such as RDP should be restricted to known IP addresses.
AWS Link https://cloud.google.com/vpc/docs/using-firewalls
Recommended Action Restrict TCP port 3389 to known IP addresses


Detailed Remediation Steps

  1. Log into the Google Cloud Platform Console.
  2. Scroll down the left navigation panel and choose the "Networking" to select the "Firewall rules" option under the "VPC network."
  3. On the "Firewall rules" page, select the "Firewall rule" which needs to be verified.
  4. On the selected "Firewall rules", if TCP port 3389 for "RDP" is open to the public then the selected "Firewall rule" is not as per the best standards.
  5. Repeat steps number 2 - 4 to verify another "Firewall rule" in the network.
  6. Navigate to "VPC network" and choose the "Firewall rules" option under the "Networking" and select the "Firewall rule" which needs to be restricted to known IP addresses.
  7. On the "Firewall rules" page, click on the "Edit" button at the top and under the "Source IP ranges" enter the IP addresses as per the requirements.
  8. Click on the "Save" button at the bottom to make the changes.
  9. Repeat steps number 6 - 8 to restrict TCP port 3389 to known IP addresses.

Want to scan for this risk automatically?

Get Started Now