S6E18 - Securing Access to Your Virtual Machines with Azure Bastion
Let's Talk Azure!18 Heinä 2025

S6E18 - Securing Access to Your Virtual Machines with Azure Bastion

In this episode, we explore Azure Bastion, Microsoft’s fully managed Platform-as-a-Service (PaaS) solution designed to provide secure Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to Azure virtual machines (VMs). This Q&A-style episode dives deep into how Azure Bastion strengthens cloud security by eliminating the need for public IP addresses on VMs, reducing exposure to external threats like port scanning or protocol exploits. Alan poses critical questions about Azure Bastion’s functionality, architecture, deployment options, and integration with Azure’s security ecosystem, while our consultant delivers actionable insights tailored for IT administrators, security professionals, and cloud architects.

We cover:

  • Core Functionality: How Azure Bastion enables secure, clientless RDP/SSH access via the Azure portal or native clients, protecting VMs by removing public IP dependencies.
  • Architecture Breakdown: The role of the dedicated AzureBastionSubnet, private IP connectivity, and TLS-based sessions, including support for zonal deployments for high availability.
  • SKU Options: A detailed look at Developer, Basic, Standard, and Premium SKUs, highlighting features like session recording, Private Link integration, and host scaling for different organizational needs.
  • Security Integrations: How Azure Bastion works with Microsoft Defender for Cloud, Microsoft Entra ID (with MFA and conditional access), Azure Private Link, and Azure Monitor to enforce Zero Trust principles and ensure compliance.
  • Real-World Use Cases: Practical scenarios, such as secure admin access for global teams, compliance for regulated industries (e.g., healthcare, finance), and streamlined dev/test environments, with examples like Metinvest’s global VM management.
  • Best Practices: Tips for deployment (e.g., subnet sizing, VNet peering), security (e.g., MFA, NSG configuration), monitoring (e.g., Azure Monitor logs), and cost management (e.g., SKU selection, scaling strategies).
  • Limitations and Considerations: Key factors like SKU constraints, regional availability for zonal deployments, performance considerations, and cost implications, with guidance on mitigating challenges.

What did you think of this episode? Give us some feedback via our contact form, Or leave us a voice message in the bottom right corner of our site.

Read transcript

Jaksot(155)

S5E38 - Microsoft updates October - new products and features released

S5E38 - Microsoft updates October - new products and features released

This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our in...

8 Marras 202434min

S5E37 - Monitor and secure OAuth applications using App Governance

S5E37 - Monitor and secure OAuth applications using App Governance

This week Alan and Sam discuss OAuth applications and their potential risks. Alan goes into how App Governance can give you the visibility of OAuth app and their usage. Here are a few things we covere...

25 Loka 202436min

S5E36 - Mastering Azure Web Jobs: Automating Tasks in the Cloud

S5E36 - Mastering Azure Web Jobs: Automating Tasks in the Cloud

This week Alan and Sam discuss Azure Web Jobs which is a feature of Azure App Service that allows developers to run background tasks, scripts, and long-running processes alongside their web applicatio...

11 Loka 202436min

S5E35 - Microsoft updates September - new products and features released

S5E35 - Microsoft updates September - new products and features released

This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our in...

4 Loka 202439min

S5E34 - Secure Your Tokens: Defend Against Theft and Replay Attacks

S5E34 - Secure Your Tokens: Defend Against Theft and Replay Attacks

In this episode, Sam and Alan dive deep into the world of token theft and token replay attacks. They explore what these threats are and discuss effective countermeasures to reduce the risk of token th...

20 Syys 202437min

S5E33 - Azure VM Image Builder - A managed Azure service to handle VM image building

S5E33 - Azure VM Image Builder - A managed Azure service to handle VM image building

This week Alan and Sam discuss Azure VM Image Builder which is a service that simplifies the creation, customisation, and management of virtual machine images in Azure, automating tasks like software ...

13 Syys 202441min

S5E32 - Microsoft updates August- new products and features released

S5E32 - Microsoft updates August- new products and features released

This week, Alan and Sam talk about new features and services that have gone into Public Preview or General Available status in the last month. We dive into a couple of these updates that peaked our in...

6 Syys 202438min

S5E31 - Microsoft Security Exposure Management

S5E31 - Microsoft Security Exposure Management

Alan and Sam dive into Microsoft's Security Exposure Management platform. Alan takes us through the various components and the benefits on using this platform. Here are a few things we covered: What ...

30 Elo 202435min