S6E18 - Securing Access to Your Virtual Machines with Azure Bastion
Let's Talk Azure!18 Heinä 2025

S6E18 - Securing Access to Your Virtual Machines with Azure Bastion

In this episode, we explore Azure Bastion, Microsoft’s fully managed Platform-as-a-Service (PaaS) solution designed to provide secure Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to Azure virtual machines (VMs). This Q&A-style episode dives deep into how Azure Bastion strengthens cloud security by eliminating the need for public IP addresses on VMs, reducing exposure to external threats like port scanning or protocol exploits. Alan poses critical questions about Azure Bastion’s functionality, architecture, deployment options, and integration with Azure’s security ecosystem, while our consultant delivers actionable insights tailored for IT administrators, security professionals, and cloud architects.

We cover:

  • Core Functionality: How Azure Bastion enables secure, clientless RDP/SSH access via the Azure portal or native clients, protecting VMs by removing public IP dependencies.
  • Architecture Breakdown: The role of the dedicated AzureBastionSubnet, private IP connectivity, and TLS-based sessions, including support for zonal deployments for high availability.
  • SKU Options: A detailed look at Developer, Basic, Standard, and Premium SKUs, highlighting features like session recording, Private Link integration, and host scaling for different organizational needs.
  • Security Integrations: How Azure Bastion works with Microsoft Defender for Cloud, Microsoft Entra ID (with MFA and conditional access), Azure Private Link, and Azure Monitor to enforce Zero Trust principles and ensure compliance.
  • Real-World Use Cases: Practical scenarios, such as secure admin access for global teams, compliance for regulated industries (e.g., healthcare, finance), and streamlined dev/test environments, with examples like Metinvest’s global VM management.
  • Best Practices: Tips for deployment (e.g., subnet sizing, VNet peering), security (e.g., MFA, NSG configuration), monitoring (e.g., Azure Monitor logs), and cost management (e.g., SKU selection, scaling strategies).
  • Limitations and Considerations: Key factors like SKU constraints, regional availability for zonal deployments, performance considerations, and cost implications, with guidance on mitigating challenges.

What did you think of this episode? Give us some feedback via our contact form, Or leave us a voice message in the bottom right corner of our site.

Read transcript

Jaksot(155)

S2E18 - Microsoft Defender for IoT – Discover and protect your IoT Devices

S2E18 - Microsoft Defender for IoT – Discover and protect your IoT Devices

Alan and Sam discuss Microsoft Defender for IoT and why it is a useful tool have in an organisation to reduce cyber risk. Alan takes the role of the 'Expert' and explains how you can easily discover y...

4 Marras 202256min

S2E17 - Microsoft Sentinel - Cloud-native SIEM and SOAR capabilities

S2E17 - Microsoft Sentinel - Cloud-native SIEM and SOAR capabilities

Alan and Sam discuss how Microsoft Sentinel can help organisations have visibility of malicious activity in their environment. Alan takes the role of the 'Expert' and explains the capability of Micros...

28 Loka 20221h 8min

S2E16 - Microsoft Ignite 2022 - The In-Person Experience

S2E16 - Microsoft Ignite 2022 - The In-Person Experience

Alan and Sam discuss Microsoft Ignite 2022, the announcements and how the in-person experience vs remote was. Sam quizzes Alan on his experience in Seattle and ignite. Link to the Ignite 2022 Book of ...

21 Loka 202255min

S2E15 - Azure Sphere – Securing IoT Devices from Silicon to Cloud

S2E15 - Azure Sphere – Securing IoT Devices from Silicon to Cloud

Alan and Sam discuss Azure Sphere, it's features and the security and operational value it can bring to your IoT estate. Sam takes the role of the 'Expert' and explains his experience with the Azure S...

14 Loka 202250min

S2E14 - Microsoft Defender Vulnerability Management

S2E14 - Microsoft Defender Vulnerability Management

Alan and Sam discuss Microsoft's Threat Vulnerability Management and why it is a useful tool have in an organisation to reduce cyber risk. Alan takes the role of the 'Expert' and explains how you can ...

7 Loka 202245min

S2E13 - Architecting Serverless Applications in Azure/O365

S2E13 - Architecting Serverless Applications in Azure/O365

Alan and Sam discuss how server applications in Azure can help you to more efficiently build applications for your business in a different way to traditional application development. We both take the ...

30 Syys 20221h 5min

S2E12 - Microsoft Purview Information Protection – Classify and Secure Your data

S2E12 - Microsoft Purview Information Protection – Classify and Secure Your data

Alan and Sam discuss how Microsoft Purview Information Protection can help label, classify and protect your data in Office 365 . Alan takes the role of the 'Expert' and explains how you can easily sta...

23 Syys 20220s

S2E11 - Microsoft Purview Data Governance Portal

S2E11 - Microsoft Purview Data Governance Portal

Alan and Sam discuss how the Microsoft Purview – Data Governance Portal can help you to manage and govern your organisations data. Sam takes the role of the 'Expert' and explains the 'Train the Traine...

16 Syys 20221h 5min