/
SSH Access to the Internet should be blocked

SSH Access to the Internet should be blocked

Description:

All SSH ports on any machine within Azure should have either CU subnets as a filter or the individual hosts IP as a /32 CIDR block. Under no reason should anyone on the internet should be able to view an OpenSSH port without using VPN or use your individual static IP address.



Solution/Reference: 

Learn more about SSH in Azure here:

https://docs.microsoft.com/en-us/azure/virtual-machines/linux/ssh-from-windows

Related content

All Network Ports Should Be Restricted on Network Security Groups Associated to Your Virtual Machine
All Network Ports Should Be Restricted on Network Security Groups Associated to Your Virtual Machine
More like this
Management Ports Should Be Closed on Your Virtual Machines
Management Ports Should Be Closed on Your Virtual Machines
More like this
IP Forwarding on Your Virtual Machine Should Be Disabled
IP Forwarding on Your Virtual Machine Should Be Disabled
More like this
Management Ports of Virtual Machines Should be Protected with Just-In-Time Network Access Control
Management Ports of Virtual Machines Should be Protected with Just-In-Time Network Access Control
More like this
Public Network Access on Azure SQL Database Should Be Disabled
Public Network Access on Azure SQL Database Should Be Disabled
More like this
Public Network Access Should Be Disabled for MySQL Servers
Public Network Access Should Be Disabled for MySQL Servers
More like this