No Result
View All Result
Simon Angling
  • Home
  • About Me
  • Cyber Security
  • Productivity
  • Blog
    • Cyber Security
    • Design
    • Education
    • Learning Out Loud
    • Microsoft
    • Productivity
    • Technology
  • Contact Me
Simon Angling
  • Home
  • About Me
  • Cyber Security
  • Productivity
  • Blog
    • Cyber Security
    • Design
    • Education
    • Learning Out Loud
    • Microsoft
    • Productivity
    • Technology
  • Contact Me
No Result
View All Result
Simon Angling
No Result
View All Result
Home Learning Out Loud

A Quick Look at Azure Just-in-Time Virtual Machine Access

Simon Angling by Simon Angling
February 5, 2020 - Updated on February 9, 2020
in Learning Out Loud, Technology

If you are running servers in Azure, and especially if they have a public IP address, you will want to lock down incoming traffic to these VMs as much as possible. In particular, ports used for remote administration as they are a common target for hackers.

As well as standard measures, such as Network Security Groups (NSG) and Azure Firewall, Microsoft Azure offers Just-in-time (JIT) VM access via the Azure Security Centre.

JIT minimises the risk of a brute force attacks against common ports (or any ports you define) by creating NSG and Azure Firewall (if needed) rules to lock down inbound traffic to a VM. These ports are configurable when you set up JIT by default the ports that are managed are:

  • 22 – SSH
  • 3389 – RDP
  • 5985 – WinRM
  • 5986 – WinRM

When access is requested, assuming the requestor has the required permissions, the Azure Security Center automatically configures the Network Security Groups (NSGs) and Azure Firewall to allow inbound traffic to the selected ports, from the requested source IP addresses, for the time specified.

Our requirement today was to grant JIT access to Azure VMs which have a public IP address whilst using the principle of least privilege and giving the minimum possible rights over the VM within the Azure portal. This was to allow an external service provider to log into the Azure portal and request JIT access for specific servers without being granted any additional privileges.

Over the next couple of days, I’m going to cover the following topics:

  1. Implementing Just-in-time VM Access in Azure Security Center
  2. Implementing Just-in-time VM Access in VM page
  3. Role-based access controls (RBAC) in Azure
  4. Creating custom RBAC rules
  5. Granting JIT access to VMs via RBAC using the principle of least privilege

This will hopefully help people start using JIT and ultimately lead to more secure environments for your internet-facing VMs.

This post is part of my Learning out Loud series. You can read more about Learning out Loud and how it came about here: https://simonangling.com/learning-out-loud/

Related

Tags: AzureLearning Out LoudSecurity
Previous Post

Tracking Attendees in a Microsoft Teams Meeting

Next Post

First look at Azure Backup Explorer public preview

Next Post

First look at Azure Backup Explorer public preview

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

GTD and InBox Zero with Microsoft Outlook

Microsoft Defender Products and Licensing Demystified

A Quick Look at Azure Just-in-Time Virtual Machine Access

Defender for Endpoint for Servers vs Defender for Cloud Server

Free Data Ingestion into Microsoft Sentinel Explained

Increasing upload_max_size in php.ini with Azure Web Apps

What is Security Orchestration, Automation, and Response (SOAR)

Azure Front Door Vanilla, Standard and Premium

What is Zero Trust, and how Microsoft implements it

Microsoft Cybersecurity Reference Architectures (MCRA) Updated

Categories

  • Africa Overland
  • Archive
  • Asides
  • Cyber Security
  • Design
  • Education
  • Learning Out Loud
  • Microsoft
  • Personal
  • Productivity
  • Quotes
  • South Africa
  • Technology
  • Travel
  • Web Development
  • Privacy Policy
  • Cookie Policy

© 2024 Simon Angling

No Result
View All Result
  • Home
  • About Me
  • Cyber Security
  • Productivity
  • Blog
    • Cyber Security
    • Design
    • Education
    • Learning Out Loud
    • Microsoft
    • Productivity
    • Technology
  • Contact Me

© 2024 Simon Angling