Implementing JIT VM access
As we continue our defense-in-depth journey, in this section, we will look at another solution to increase your security posture, reduce exposure to attacks, and disrupt and block the path of threat actors.
This recipe looks at limiting access to vulnerable management ports on a VM using the JIT VM feature.
We will cover how to enable JIT access for VMs from within the Virtual machines blade using the Azure portal, requesting access for a JIT-enabled VM, and activity auditing.
Getting ready
This recipe requires the following:
- A device with a browser, such as Edge or Chrome, to access the Azure portal at https://portal.azure.com
- You should sign in with an account that has the Owner role for the Azure subscription
- Microsoft Defender for Servers Plan 2 must be enabled on the subscription used for this exercise; we will step through this process in the following Getting ready tasks if not already enabled
- An Azure VM; we will walk...