We would like to implement the following rules: - [x] 6.1 Ensure that RDP access from the Internet is evaluated and restricted - [x] 6.2 Ensure that SSH access from the Internet is evaluated and restricted - [x] 6.3 Ensure that UDP access from the Internet is evaluated and restricted - [x] 6.4 Ensure that HTTP(S) access from the Internet is evaluated and restricted
We would like to implement the following rules: