Skip to content

Commit bd04e16

Browse files
authored
Merge pull request #52834 from R-C-Stewart/jit-access-refresh
end to end refresh of module
2 parents fc697d1 + 7d6906e commit bd04e16

6 files changed

Lines changed: 93 additions & 64 deletions
Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,21 @@
1-
This module covers understanding just-in-time (JIT) VM access, addressing risks of open management ports, and implementing JIT with Microsoft Defender for Cloud to enhance security in Azure and AWS environments.
1+
This module covers understanding just-in-time (JIT) machine access, addressing risks of open management ports, and implementing JIT with Microsoft Defender for Cloud to enhance security in Azure and Amazon Web Services (AWS) environments.
2+
3+
> [!NOTE]
4+
> Just-in-time machine access requires **Microsoft Defender for Servers Plan 2** to be enabled on your subscription.
25
36
## Scenario
47

5-
Imagine you're responsible for securing your company's virtual machines in Azure and AWS. Understanding just-in-time (JIT) VM access is crucial. Threat actors target open management ports, like RDP or SSH, to infiltrate your network. By implementing JIT with Microsoft Defender for Cloud, you can lock down these ports, allowing temporary access only to authorized users. This reduces the attack surface and enhances the overall security of your cloud environment.
8+
Imagine you're responsible for securing your company's virtual machines in Azure and AWS. Using just-in-time (JIT) machine access is crucial for protecting against modern threats. Threat actors continuously scan for machines with open management ports, like RDP or SSH, using automated tools to launch brute-force attacks and infiltrate your network. By implementing JIT with Microsoft Defender for Cloud, you can lock down these ports, allowing temporary, audited access only to authorized users when needed. JIT significantly reduces the attack surface and enhances the overall security posture of your cloud environment.
69

710
## Learning Objectives
811

912
By the end of this training module, participants will:
1013

11-
- Understand the risks associated with open management ports on virtual machines.
12-
- Learn how to implement JIT VM access using Microsoft Defender for Cloud.
13-
- Explore how JIT VM access reduces attack surfaces in Azure and AWS environments.
14-
- Gain skills to configure and manage temporary, controlled access to VMs for authorized users.
14+
- Understand the risks associated with open management ports on virtual machines and how attackers exploit them.
15+
- Learn how to implement JIT machine access using Microsoft Defender for Cloud (requires Defender for Servers Plan 2).
16+
- Explore how JIT machine access reduces attack surfaces in Azure and AWS environments.
17+
- Gain skills to configure and manage temporary, controlled, and audited access to VMs for authorized users.
1518

1619
## Goals
1720

18-
By the end of this module, you'll understand JIT VM access, know how to implement it with Microsoft Defender for Cloud, reduce attack surfaces in Azure and AWS, and manage temporary access to VMs.
21+
By the end of this module, you'll understand JIT machine access, and know how to implement it with Microsoft Defender for Cloud (Defender for Servers Plan 2). Use JIT to reduce attack surfaces in Azure and AWS environments, and manage temporary, audited access to virtual machines for authorized users.

learn-pr/wwl-azure/just-in-time-access/includes/2-just-in-time-access-to-protect-azure-virtual-machines.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,32 @@
1-
## The risk of open management ports on a virtual machine
1+
Threat actors actively hunt for accessible machines with open management ports, like **Remote Desktop Protocol (RDP)** or **Secure Shell (SSH)**, using automated scanning tools and brute-force attacks. All of your virtual machines are potential targets for an attack. When a virtual machine is successfully compromised, it's used as the entry point to attack further resources within your environment and can lead to lateral movement across your network.
22

3-
Threat actors actively hunt accessible machines with open management ports, like **remote desktop protocol (RDP)** or **secure shell protocol (SSH)**. All of your virtual machines are potential targets for an attack. When a virtual machine is successfully compromised, it's used as the entry point to attack further resources within your environment.
4-
5-
To learn how to apply JIT to your VMs using the Azure portal (either Defender for Cloud or Azure Virtual Machines) or programmatically, see [How to secure your management ports with JIT](/azure/defender-for-cloud/just-in-time-access-usage).
3+
Learn how to apply Just in Time (JIT) access to your VMs using the Azure portal:
4+
- Using Microsoft Defender for Cloud or Azure Virtual Machines
5+
- Programmatically
6+
- Via REST API
7+
See [How to secure your management ports with JIT](/azure/defender-for-cloud/just-in-time-access-usage).
68

79
## Why JIT virtual machine access is the solution
810

9-
As with all cybersecurity prevention techniques, your goal should be to reduce the attack surface. In this case that means having fewer open ports especially management ports. Your legitimate users also use these ports, so it's not practical to keep them closed. To solve this dilemma, Microsoft Defender for Cloud offers JIT. With JIT, you can lock down the inbound traffic to your VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
11+
As with all cybersecurity prevention techniques, your goal should be to reduce the attack surface. In this case that means having fewer open ports especially management ports. Your legitimate users also use these ports, so it's not practical to keep them closed permanently. To solve this dilemma, Microsoft Defender for Cloud offers JIT access. With JIT, you can lock down the inbound traffic to your VMs, reducing exposure to attacks while providing easy, audited access to connect to VMs when needed.
1012

1113
## How JIT operates with network resources in Azure and AWS
1214

13-
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](/azure/virtual-network/network-security-groups-overview#security-rules) (NSG) and [Azure Firewall rules](/azure/firewall/rule-processing). These rules restrict access to your Azure VMs’ management ports and defend them from attack.<br>
15+
**In Azure**, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](/azure/virtual-network/network-security-groups-overview#security-rules) (NSG) and [Azure Firewall rules](/azure/firewall/rule-processing). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
1416

1517
If other rules already exist for the selected ports, then those existing rules take priority over the new "deny all inbound traffic" rules. If there are no existing rules on the selected ports, then the new rules take top priority in the NSG and Azure Firewall.
1618

17-
In AWS, by enabling JIT-access the relevant rules in the attached EC2 security groups, for the selected ports, are revoked which blocks inbound traffic on those specific ports.
19+
**In AWS**, by enabling JIT access, the relevant rules in the attached EC2 security groups for the selected ports are revoked, which blocks inbound traffic on those specific ports.
1820

19-
When a user requests access to a VM, Defender for Cloud checks that the user has [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/role-assignments-portal) permissions for that virtual machine. If the request is approved, Defender for Cloud configures the NSGs and Azure Firewall to allow inbound traffic to the selected ports from the relevant IP address (or range), for the amount of time that was specified. In AWS, Defender for Cloud creates a new EC2 security group that allows inbound traffic to the specified ports. After the time has expired, Defender for Cloud restores the NSGs to their previous states. Connections that are already established aren't interrupted.
21+
**Access Request Process:**
22+
When a user requests access to a VM, Defender for Cloud checks that the user has [Azure role-based access control (Azure RBAC)](/azure/role-based-access-control/role-assignments-portal) permissions for that virtual machine. If the request is approved, Defender for Cloud configures the NSGs and Azure Firewall to allow inbound traffic to the selected ports. If specified this includes the relevant IP address (or range), for the amount of time. In AWS, Defender for Cloud creates a new EC2 security group that allows inbound traffic to the specified ports. After the time expires, Defender for Cloud restores the NSGs to their previous states. Connections that are already established aren't interrupted.
2023

2124
> [!NOTE]
22-
> JIT does not support VMs protected by Azure Firewalls controlled by [Azure Firewall Manager](/azure/firewall-manager/overview). The Azure Firewall must be configured with Rules (Classic) and cannot use Firewall policies.
25+
> JIT doesn't support VMs protected by Azure Firewalls controlled by [Azure Firewall Manager](/azure/firewall-manager/overview). The Azure Firewall must be configured with Rules (Classic) and can't use Firewall policies.
2326
24-
## Added to the recommendation’s Unhealthy resources tab
27+
## Review the recommendation and categorization of VMs
2528

26-
The diagram shows the logic Defender for Cloud applies when deciding how to categorize your supported VM. When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's Unhealthy resources tab.
29+
The diagram shows the logic Defender for Cloud applies when deciding how to categorize your supported VMs. When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's **Unhealthy resources** tab.
2730

2831
**Example:** Affected resources
2932

0 commit comments

Comments
 (0)