S6E18 - Securing Access to Your Virtual Machines with Azure Bastion
Let's Talk Azure!18 Heinä 2025

S6E18 - Securing Access to Your Virtual Machines with Azure Bastion

In this episode, we explore Azure Bastion, Microsoft’s fully managed Platform-as-a-Service (PaaS) solution designed to provide secure Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to Azure virtual machines (VMs). This Q&A-style episode dives deep into how Azure Bastion strengthens cloud security by eliminating the need for public IP addresses on VMs, reducing exposure to external threats like port scanning or protocol exploits. Alan poses critical questions about Azure Bastion’s functionality, architecture, deployment options, and integration with Azure’s security ecosystem, while our consultant delivers actionable insights tailored for IT administrators, security professionals, and cloud architects.

We cover:

  • Core Functionality: How Azure Bastion enables secure, clientless RDP/SSH access via the Azure portal or native clients, protecting VMs by removing public IP dependencies.
  • Architecture Breakdown: The role of the dedicated AzureBastionSubnet, private IP connectivity, and TLS-based sessions, including support for zonal deployments for high availability.
  • SKU Options: A detailed look at Developer, Basic, Standard, and Premium SKUs, highlighting features like session recording, Private Link integration, and host scaling for different organizational needs.
  • Security Integrations: How Azure Bastion works with Microsoft Defender for Cloud, Microsoft Entra ID (with MFA and conditional access), Azure Private Link, and Azure Monitor to enforce Zero Trust principles and ensure compliance.
  • Real-World Use Cases: Practical scenarios, such as secure admin access for global teams, compliance for regulated industries (e.g., healthcare, finance), and streamlined dev/test environments, with examples like Metinvest’s global VM management.
  • Best Practices: Tips for deployment (e.g., subnet sizing, VNet peering), security (e.g., MFA, NSG configuration), monitoring (e.g., Azure Monitor logs), and cost management (e.g., SKU selection, scaling strategies).
  • Limitations and Considerations: Key factors like SKU constraints, regional availability for zonal deployments, performance considerations, and cost implications, with guidance on mitigating challenges.

What did you think of this episode? Give us some feedback via our contact form, Or leave us a voice message in the bottom right corner of our site.

Read transcript

Jaksot(155)

S4E8 - Zero-touch deployments with Microsoft Intune

S4E8 - Zero-touch deployments with Microsoft Intune

Alan and Sam discuss how Zero-Touch deployments can help organisation reduce the effort needed to build devices. Alan goes through some of the scenarios and the benefits. Here are a few things we cove...

4 Elo 202339min

S4E7 - Azure Automation - Deploy automation across Azure and non-Azure environments

S4E7 - Azure Automation - Deploy automation across Azure and non-Azure environments

This week we discussed Azure Automation. Azure automations allows you develop processes in PowerShell and Python and deploy this content to Azure to manage and orchestrate. Azure automations can run i...

28 Heinä 202346min

S4E6 - Introduce Passwordless authentication into your organisation with Microsoft technology

S4E6 - Introduce Passwordless authentication into your organisation with Microsoft technology

Alan and Sam discuss how passwordless authentication can help organisations to improve their authentication health and increase their security posture. Alan explains the concept and the solutions avai...

21 Heinä 202344min

S4E5 - Azure Confidential Ledger - Use blockchain to create secure, tamper proof data stores

S4E5 - Azure Confidential Ledger - Use blockchain to create secure, tamper proof data stores

Alan and Sam discuss how Azure Confidential Ledger can help organisations to create private tamper proof stores of data. Sam explains the features of the solution and the benefits that it can bring: ...

14 Heinä 202335min

S4E4 - Understand your Cloud Security Posture using Microsoft Defender for Cloud

S4E4 - Understand your Cloud Security Posture using Microsoft Defender for Cloud

Alan and Sam discuss why it is important to have a Cloud Security Posture Management (CSPM) solution in place. Alan explains the benefits of CSPM, and dives into Microsoft Defender for Cloud. Topics t...

7 Heinä 202351min

S4E3 - Azure Functions - Build serverless apps in the cloud, focus on code, leave the rest to Azure

S4E3 - Azure Functions - Build serverless apps in the cloud, focus on code, leave the rest to Azure

This week we discuss Azure Functions. Azure Functions allows you to build serverless applications on top of Azure. Serverless functions allow you to bring your code and let Azure handle the hosting an...

30 Kesä 202346min

S4E2 - Securing Bring Your Own Devices (BYOD) using Microsoft Technology

S4E2 - Securing Bring Your Own Devices (BYOD) using Microsoft Technology

This week we discuss how to manage Bring Your Own Devices (BYOD) securely in an organisation. With hybrid working on the rise, more flexibility is needed to reduce costs, but not as the compromise of ...

23 Kesä 202348min

S4E1 - Defender for DevOps - Add protection to your DevOps process with ease

S4E1 - Defender for DevOps - Add protection to your DevOps process with ease

This week we discuss Defender for DevOps. It gives you visibility of your security posture within your CI/CD processes. Improves your threat protection and hardening of your Infrastructure-as-code (Ia...

16 Kesä 202342min