HIGH
Source
CloudSploit
ID
open-ssh

Open SSH

Determine if TCP port 22 for SSH is open to the public

In order to deny ssh access to your virtual machines, you have to set your inbound security rules of Network Security Group to exclude ssh access to your Virtual Machine

Follow the appropriate remediation steps below to resolve the issue.

  1. Log in to the Microsoft Azure Management Console.

  2. Click the search bar at the top and search for Network security groups. Step

  3. Select the “Network security group” that needs to be verified. Step

  4. Click on the “Name” of the selected “Network security group” to access the port configurations. Step

  5. In the “Overview” tab scroll down the page and check the “Inbound security rules” under the “Settings”. Step

  6. If the “SSH” for port 22 with the protocol “TCP” is showing as “Allow” under column “Action” for all “Source” and “Destination” then the selected “Network security group” has TCP port 22 for SSH open to the public. Step

  7. Repeat step number 2 - 6 to verify other “Network security groups”.

  8. Navigate to the “Network security group” and select the security group that needs to be modified for restricting the “TCP” port for “SSH” on port 22 to specific IP Address.Step

  9. Scroll down the left navigation panel and choose “Inbound security rules” under “Settings.”Step

  10. Click on the “SSH” protocol in the “Name” column and in the right pane under “Source” select the “IP Address” from the dropdown menu and enter the “Source IP addresses/CIDR ranges” as per the requirement, select the required Protocol and Action and click on the “Save” option at the top of the pane. Step

  11. Repeat step number 8 - 10 to restrict TCP port 22 for SSH to known IP addresses.