CloudWiki
Rules
Critical

Ensure there is no unrestricted inbound access to TCP port 5601 (Kibana)

Security & Compliance
No items found.
Description

TCP port 5601 is commonly used for Kibana, a popular data visualization and exploration tool for Elasticsearch. If left open and unrestricted, it can be exploited by attackers to gain unauthorized access to the Kibana dashboard and potentially sensitive data stored in Elasticsearch. Therefore, it is important to ensure that there is no unrestricted inbound access to TCP port 5601 to prevent unauthorized access and data breaches.‍

Remediation

To ensure there is no unrestricted inbound access to TCP port 5601 (Kibana), you can follow the following remediation steps:

  1. Identify the systems running Kibana that are listening on TCP port 5601.
  2. Review the firewall rules and security groups in place for those systems to verify that access to TCP port 5601 is restricted only to authorized IP addresses or networks.
  3. If the firewall rules or security groups do not exist or are not properly configured, create or modify them to restrict access to TCP port 5601 only to authorized IP addresses or networks.
  4. Test the firewall rules or security group changes to ensure that they are functioning as expected and that unauthorized access to TCP port 5601 is blocked.
Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.