An alert is generated in cloud guard when a Virtual Cloud Network (VCN) security list permits inbound traffic on ports classified as restricted. These ports are defined in the detector’s Restricted Protocol: Ports List within the input settings. Allowing such ports through ingress rules increases the attack surface and may expose workloads to unnecessary security risks.
This alert is raised to ensure that network access remains aligned with Oracle Cloud Infrastructure security best practices.
Impact
If restricted ports are allowed in VCN security list ingress rules, unauthorized or unintended access paths may be introduced. This can lead to compliance violations, increased vulnerability to network-based attacks, and deviation from established security baselines.
Recommended Resolution
Ensure that all VCN security lists do not allow any ports defined in the Restricted Protocol: Ports List through ingress (inbound) rules.
Specifically:
Review all security list ingress rules.
Remove or restrict any ports identified as restricted by the detector rule.
Validate that only explicitly required ports are permitted.
Steps to Update the Detector Rule
Sign in to the OCI Console.
Navigate to:
Oracle Cloud Guard → Detector RecipesOpen the relevant Detector Recipe.
Select Detector Rules.
Locate the rule “VCN Security List Allows Traffic to Restricted Port.”
Edit the rule and remove port 111 from the Input Settings.
Save and apply the changes.
Best Practices for Rule Customization
Controlled Configuration:
Update the Restricted Protocol: Ports List only when there is a validated business or technical requirement.Flexible Input Options:
Restricted ports can be specified in two ways:Manually entering individual port numbers or port ranges.
Referencing one or more predefined security lists by name.
Periodic Review:
Regularly review detector rules and security list configurations to ensure continued alignment with organizational security standards.
Conclusion
Proactively managing restricted ports within VCN security lists is essential to maintaining a secure OCI networking posture. By refining detector rule input settings and enforcing strict ingress controls, organizations can significantly reduce exposure to unnecessary network risks while remaining compliant with OCI security best practices.