Control: Azure > CIS v5.0 > 7 - Networking Services > 7.02 - Ensure that SSH access from the Internet is evaluated and restricted
Configures auditing against a CIS Benchmark item.
Level: 1
Network security groups should be periodically evaluated for port misconfigurations. Where SSH is not explicitly required and narrowly configured for resources attached to a network security group, Internet-level access to Azure resources should be restricted or eliminated
The potential security problem with using SSH over the Internet is that attackers can use various brute force techniques to gain access to Azure Virtual Machines. Once the attackers gain access, they can use a virtual machine as a launch point for compromising other machines on the Azure Virtual Network or even attack networked devices outside of Azure.
Resource Types
This control targets the following resource types:
Policies
This control type relies on these other policies when running actions:
- Azure > CIS v5.0
- Azure > CIS v5.0 > 7 - Networking Services > 7.02 - Ensure that SSH access from the Internet is evaluated and restricted
- Azure > CIS v5.0 > 7 - Networking Services
Category
In Your Workspace
Developers
- tmod:@turbot/azure-cisv5-0#/control/types/r0702
- tmod:@turbot/cis#/control/categories/v070902
- turbot graphql controls --filter "controlTypeId:tmod:@turbot/azure-cisv5-0#/control/types/r0702"
Get Controls