Disclaimer: The views expressed herein are for reference only and don't necessarily represent the official views of Alibaba Cloud.
Cyber threats targeting cloud systems often begin with exposed remote access ports such as RDP (3389) and SSH (22).
When these services are open to the public, automated scanners and password-spray tools continuously attempt to exploit them.
Alibaba Cloud Firewall provides a centralized protection layer at the VPC boundary.
By enforcing strict allow-lists, blocking suspicious sources, and monitoring all inbound traffic, it reduces the likelihood of unauthorized access.
This guide outlines seven practical steps to improve cloud security using Alibaba Cloud Firewall.
Attackers follow a predictable sequence:
| Internet Attackers |
|---|
| Scan for open ports (22/3389) |
| Public ECS Instance |
| Password sprays / stolen creds |
| +----------------------+ |
| Initial Access Gained |
| +----------------------+ |
| v |
| +----------------------------+ |
| Lateral Movement Attempted |
| +----------------------------+ |
Cloud Firewall acts as the first enforcement point.
Allowed Source Only
|
v
Routing administrator access through a single static outbound IP removes the need for broad “allow-all” rules and ensures that every login attempt maps back to a known, trusted source. This approach improves traceability and reduces the attack surface significantly.
In practice, this can be achieved using a VPN service that provides a fixed, non-rotating IP address.
For example, some teams use a dedicated-IP model (such as TorGuard’s dedicated-IP) to ensure that the same address is always presented when administrators connect.
The key requirement is simply that the IP remains consistent so it can be safely allow-listed in Alibaba Cloud Firewall.
| Admin PC |
|---|
| VPN Tunnel |
| Static Public IP |
| v |
| Alibaba Cloud Firewall |
| +------------------------+ |
| v |
| +------------------------+ |
| Bastion Host / ECS |
| +------------------------+ |
A bastion host centralizes all administrative access.
| Alibaba Cloud Firewall |
|---|
| v |
| +------------------+ |
| v |
| +--------------------------+ |
| Private ECS Instances |
| +--------------------------+ |
This ensures workloads remain private and inaccessible directly from the internet.
Use Alibaba Cloud Security Center to:
When an alert fires:
| Admin PC |
|---|
| MFA + Identity Check |
| Zero-Trust Gate |
| v |
| +------------------------+ |
| v |
| +------------------+ |
| Bastion Host |
| +------------------+ |
| v |
| +------------------+ |
| Private ECS |
| +------------------+ |
Alibaba Cloud Firewall, combined with strict source controls, bastion architecture, strong identity enforcement, and segmented networks, creates a secure environment where only verified and authorized traffic can reach critical workloads.
By focusing on a single controlled entry point and a layered defense strategy, organizations significantly reduce the risk of unauthorized access and lateral movement.
6 posts | 2 followers
FollowAmuthan Nallathambi - August 24, 2023
Alibaba Cloud Indonesia - January 8, 2025
Nick Patrocky - January 24, 2024
Alibaba Cloud Indonesia - December 6, 2023
Alibaba Clouder - January 27, 2021
Redspan - September 30, 2022
6 posts | 2 followers
Follow
Alibaba Cloud Linux
Alibaba Cloud Linux is a free-to-use, native operating system that provides a stable, reliable, and high-performance environment for your applications.
Learn More
Storage Capacity Unit
Plan and optimize your storage budget with flexible storage services
Learn More
Edge Node Service
An all-in-one service that provides elastic, stable, and widely distributed computing, network, and storage resources to help you deploy businesses on the edge nodes of Internet Service Providers (ISPs).
Learn More
CDN(Alibaba Cloud CDN)
A scalable and high-performance content delivery service for accelerated distribution of content to users across the globe
Learn MoreMore Posts by Kalpesh Parmar