Security – Securing RDP for Internal Servers

rdpSecuritywindows-server-2003windows-server-2008

Background: Currently, we manage our servers through an IP KVM, but we're slooooowly migrating to VMWare ESXi. The KVM interface is clunky and user management is a little cumbersome and I'd like to keep people away from the VIC Console if possible. RDP is not allowed on our network, as all traffic must funnel through the VIC or KVM, which have certificates from an internal CA.

Question: I'm using this transition to push toward RDP for internal management of servers. I'd like to make my case for RDP, but security (even though these servers are not Internet-facing) is still a concern. I've looked at TS Gateway, but it seems that it is for Internet to remote server, not from internal client to internal server. I know this is pretty broad, and please feel free to ask for clarification, but what is the best way to securely implement RDP on internal servers.

Best Answer

As with any technology -- limit your surface area. Do not leave plain jane RDP open to the world. Require a VPN, or some other sort of pass-through authentication from a trusted vendor (web-ssl gateway, etc).

For internal use -- standard password management policies should be in place with lockout's configured. Configure RDP to use the highest level security (Force RDP to use 128-bit encryption via GPO). RDP is atleast as secure as VIC or most KVM's. Millions of people use Citrix or Terminal Services daily. VIC and a KVM simply don't have this number of installed devices, or people attempting to exploit them. Given two competing mature technologies with no known exploit, I would consider the one with many magnitudes the installed base more secure than the one with a limited installation base typically shrouded inside a private network with proprietary one-vendor tools.

For external clients I would consider a 3rd party secure SSLVPN gateway with client certificate authentication if you want that level of security.

If you seriously don't trust RDP, but do trust, say SSH... there is a commercial RDP over SSH application called WiSSH that can implement two factor authentication along with two separate layers of security.

RDP has been an option on every installation of Windows XP Professional and Windows Server since 2000. It is the remote access management tool for Windows Servers, and has seen very few vulnerabilities in the past 9 years. Even WindowsSecurity.com's list of suggestions are banal in their complexity, and mirror any other management system's best practices.

Related Topic