CloudWiki
Rules
Critical

Ensure there is no unrestricted inbound access to all TCP ports

Security & Compliance
Description

Ensuring that there is no unrestricted inbound access to all TCP ports is a security best practice to protect against unauthorized access and data breaches. Unrestricted inbound access refers to allowing any source IP address to connect to any TCP port on a server, which can leave the server vulnerable to attack. By ensuring that there is no unrestricted inbound access to all TCP ports, organizations can help reduce the risk of unauthorized access and data breaches, and help ensure the overall security of their network and systems.‍

Remediation

If unrestricted inbound access to all TCP ports has been identified within an organization's network, it is important to take immediate remediation steps to reduce the risk of unauthorized access and data breaches. Here are some recommended steps to take:

  1. Review and modify security group or NACL rules: Organizations should review and modify the security group or NACL rules for the relevant resources to ensure that inbound traffic is only allowed from trusted sources and on necessary ports.
  2. Implement the principle of least privilege: Organizations should implement the principle of least privilege when defining security group or NACL rules. This means allowing only the minimum required ports and IP addresses to access the resource.
  3. Regularly review and update security group or NACL rules: Organizations should regularly review and update their security group or NACL rules as needed to ensure that they remain up to date with any changes to the organization's network architecture or security requirements.
  4. Use network segmentation: Organizations should use network segmentation to limit the exposure of resources to unauthorized access. This involves grouping resources based on their level of sensitivity and applying stricter security controls to more sensitive resources.
  5. Use network security tools: Organizations should use network security tools, such as firewalls, intrusion detection and prevention systems (IDPS), and network monitoring tools, to detect and prevent unauthorized access and other security threats.

By taking these remediation steps, organizations can help ensure that there is no unrestricted inbound access to all TCP ports, reduce the risk of unauthorized access and data breaches, and help ensure the overall security of their network and systems.

Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.