CloudWiki
Rules
Critical

Ensure there is no unrestricted inbound access to TCP port 7473 (Neo4j)

Security & Compliance
No items found.
Description

Ensuring that there is no unrestricted inbound access to TCP port 7473 is important in protecting your Neo4j server from unauthorized access and potential attacks. TCP port 7473 is used by Neo4j for secure HTTPS communication with the Neo4j browser, and leaving it open and unrestricted can allow attackers to gain access to sensitive data and execute unauthorized commands on the server. It is essential to ensure that access to this port is limited to authorized users and networks.

Remediation

To prevent unrestricted inbound access to TCP port 7473, the following remediation steps can be taken:

  • Configure the firewall or security group associated with the server to restrict inbound traffic on TCP port 7473 to authorized IP addresses or networks.
  • Implement SSL/TLS encryption and certificate-based authentication to secure communication with the Neo4j server and prevent unauthorized access.
  • Regularly monitor and audit access logs to detect and respond to any unauthorized access attempts to the server.
Enforced Resources
Note: Remediation steps provided by Lightlytics are meant to be suggestions and guidelines only. It is crucial to thoroughly verify and test any remediation steps before applying them to production environments. Each organization's infrastructure and security needs may differ, and blindly applying suggested remediation steps without proper testing could potentially cause unforeseen issues or vulnerabilities. Therefore, it is strongly recommended that you validate and customize any remediation steps to meet your organization's specific requirements and ensure that they align with your security policies and best practices.