Offene Ports

Open ports

An ‘open port’ is an access point on a computer or server that is accessible and active for data traffic. Programs and services communicate with each other via ports – they are therefore necessary, but also potential vulnerabilities.

 

What does this mean in detail?

A port functions like a door: if it is open, data traffic can pass through – for example, to access websites (port 80/443) or for remote maintenance (port 22 for SSH). An ‘open’ port means that this service is accessible and accepts connections.

 

Why do you need open ports?

Open ports are needed so that:

  • Websites are accessible
  • Email communication works
  • Remote access (e.g. remote maintenance or VPN) is possible
  • Servers can communicate with clients

 

Where do I encounter this issue in the day-to-day work of an SME?

  • IT service providers open ports to set up remote access to a system, for example
  • Web servers or mail servers in the company require certain open ports to be accessible
  • Firewall configurations require decisions to be made about which ports are open or closed
  • Vulnerability scans or pentests regularly reveal insecure open ports
  • Cyber attacks (e.g. through ransomware) often use outdated or unnecessarily open ports as a gateway

 

Protective measures against cyber attacks via open ports

  1. Only leave necessary ports openConsistently close all ports that are not absolutely necessary for operation. Every unnecessary ‘open door’ increases the risk.
  2. Configure your firewall consistentlyUse a central firewall (e.g. in your router or UTM solution) to allow or block access in a targeted manner. Windows/Linux firewalls should also be activated.
  3. Restrict access (e.g. IP-based)Restrict remote access to specific IP addresses or countries. This prevents anyone worldwide from accessing open services.
  4. VPN instead of direct port forwardingAvoid direct forwarding of sensitive services such as Remote Desktop (RDP) or SSH wherever possible. Instead, use a secure VPN to enable remote access.
  5. Keep services up to dateEnsure that the systems and services running behind the ports are updated regularly. Outdated software is often vulnerable.
  6. Perform (or have someone perform) port scansPerform regular port scans (e.g. with the help of an IT service provider) to detect unintentionally opened ports at an early stage.
  7. Set up monitoring Monitor activity on open ports, e.g. using an intrusion detection system (IDS) or log analysis. This allows attacks or misuse to be detected at an early stage.