Reader small image

You're reading from  Azure Security Cookbook

Product typeBook
Published inMar 2023
Reading LevelBeginner
PublisherPackt
ISBN-139781804617960
Edition1st Edition
Languages
Tools
Right arrow
Author (1)
Steve Miles
Steve Miles
author image
Steve Miles

Steve Miles is a Microsoft security and Azure/hybrid MVP and MCT with over 20 years of experience in security, networking, storage, end user computing, and cloud solutions. His current focus is on securing, protecting, and managing identities, Windows clients, and Windows server workloads in hybrid and multi-cloud platform environments. His first Microsoft certification was on Windows NT and he is an MCP, MCITP, MCSA, and MCSE for Windows and many other Microsoft products. He also holds multiple Microsoft Fundamentals, Associate, Expert, and Specialty certifications in Azure security, identity, network, M365, and D365. He also holds multiple security, networking vendor, and other public cloud provider certifications.
Read more about Steve Miles

Right arrow

Securing Remote Access

In the previous chapter, we covered recipes that provided security for Azure networks.

Before implementing resources in Azure, we should consider how we provide remote access in a secure, controlled, and auditable manner.

This chapter looks at how we can provide this protection for our networks and the resources they access.

We will follow on from the network security aspects of the previous chapter, breaking down the chapter into recipes to securely extend an on-premises site into Azure through an encrypted virtual network gateway service using Azure Network Adapter.

We will look at the Azure Bastion service, which allows us RDP and SSH access without needing to open these management ports or provide public IPs for resources on the virtual network.

Finally, we will cover how to minimize exposure for our Azure Virtual Machines (VMs) by locking down inbound traffic and restricting access to the management ports through Just-in-Time (JIT) access...

Technical requirements

For this chapter, it is assumed that you have an Azure AD tenancy and an Azure subscription from completing the recipes in previous chapters of this cookbook. If you skipped straight to this section, the information to create a new Azure AD tenancy and an Azure subscription for these recipes is included in the following list of requirements.

For this chapter, the following are required for the recipes:

  • A device with a browser, such as Edge or Chrome, to access the Azure portal at https://portal.azure.com.
  • An Azure AD tenancy and Azure subscription; you may use existing ones or sign up for free at https://azure.microsoft.com/en-us/free.
  • An Owner role for the Azure subscription.
  • An on-premises Windows Server 2019 machine (physical or virtual) with local administrator privilege and internet access. This server should have Windows Admin Center (WAC) installed and be registered with your Azure subscription; the following Microsoft Learn articles...

Implementing Azure Network Adapter

As part of a hybrid cloud strategy, it is important to consider how you will implement secure and protected cross-premises connectivity without public IP addressing and exposing vulnerable management ports and protocols to the internet.

This recipe will teach you to implement Azure Network Adapter to securely connect your on-premises Window Server to your Azure virtual network using a Point-to-Site encrypted Virtual Private Network (VPN) connection.

Getting ready

This recipe requires the following:

  • A device with a browser, such as Edge or Chrome, to access the Azure portal at https://portal.azure.com.
  • Access to an Azure subscription, where you have access to the Owner role for the Azure subscription.
  • An on-premises or non-Azure hosted Windows 2019 server where we will enable Azure Network Adapter; this server will be used to establish the connection to the Azure target VM. If this server has any network filtering, such as...

Implementing the Azure Bastion service

Azure Bastion is a Microsoft fully managed RDP/SSH secure remote access connectivity solution for your Azure VM resources. It protects your Azure VMs’ vulnerable RDP/SSH management ports without exposing them to the internet or requiring public IP addressing in your virtual network.

Getting ready

This recipe requires the following:

  • A device with a browser, such as Edge or Chrome, to access the Azure portal: https://portal.azure.com.
  • You should sign in with an account that has the Owner role for the Azure subscription.
  • A Windows Server Azure VM to use with this recipe; we will step through creating this VM as a Getting ready task:
    • To keep this recipe simple, the VM will be created without an NSG attached to its network interface or the VM’s subnet. We will discuss this further in the There’s more section of this recipe.
    • This will not have a public IP address associated with its network interface.
    • The virtual...

Implementing JIT VM access

As we continue our defense-in-depth journey, in this section, we will look at another solution to increase your security posture, reduce exposure to attacks, and disrupt and block the path of threat actors.

This recipe looks at limiting access to vulnerable management ports on a VM using the JIT VM feature.

We will cover how to enable JIT access for VMs from within the Virtual machines blade using the Azure portal, requesting access for a JIT-enabled VM, and activity auditing.

Getting ready

This recipe requires the following:

  • A device with a browser, such as Edge or Chrome, to access the Azure portal at https://portal.azure.com
  • You should sign in with an account that has the Owner role for the Azure subscription
  • Microsoft Defender for Servers Plan 2 must be enabled on the subscription used for this exercise; we will step through this process in the following Getting ready tasks if not already enabled
  • An Azure VM; we will walk...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Azure Security Cookbook
Published in: Mar 2023Publisher: PacktISBN-13: 9781804617960
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Author (1)

author image
Steve Miles

Steve Miles is a Microsoft security and Azure/hybrid MVP and MCT with over 20 years of experience in security, networking, storage, end user computing, and cloud solutions. His current focus is on securing, protecting, and managing identities, Windows clients, and Windows server workloads in hybrid and multi-cloud platform environments. His first Microsoft certification was on Windows NT and he is an MCP, MCITP, MCSA, and MCSE for Windows and many other Microsoft products. He also holds multiple Microsoft Fundamentals, Associate, Expert, and Specialty certifications in Azure security, identity, network, M365, and D365. He also holds multiple security, networking vendor, and other public cloud provider certifications.
Read more about Steve Miles