S6E18 - Securing Access to Your Virtual Machines with Azure Bastion
Let's Talk Azure!18 Juli 2025

S6E18 - Securing Access to Your Virtual Machines with Azure Bastion

In this episode, we explore Azure Bastion, Microsoft’s fully managed Platform-as-a-Service (PaaS) solution designed to provide secure Remote Desktop Protocol (RDP) and Secure Shell Protocol (SSH) access to Azure virtual machines (VMs). This Q&A-style episode dives deep into how Azure Bastion strengthens cloud security by eliminating the need for public IP addresses on VMs, reducing exposure to external threats like port scanning or protocol exploits. Alan poses critical questions about Azure Bastion’s functionality, architecture, deployment options, and integration with Azure’s security ecosystem, while our consultant delivers actionable insights tailored for IT administrators, security professionals, and cloud architects.

We cover:

  • Core Functionality: How Azure Bastion enables secure, clientless RDP/SSH access via the Azure portal or native clients, protecting VMs by removing public IP dependencies.
  • Architecture Breakdown: The role of the dedicated AzureBastionSubnet, private IP connectivity, and TLS-based sessions, including support for zonal deployments for high availability.
  • SKU Options: A detailed look at Developer, Basic, Standard, and Premium SKUs, highlighting features like session recording, Private Link integration, and host scaling for different organizational needs.
  • Security Integrations: How Azure Bastion works with Microsoft Defender for Cloud, Microsoft Entra ID (with MFA and conditional access), Azure Private Link, and Azure Monitor to enforce Zero Trust principles and ensure compliance.
  • Real-World Use Cases: Practical scenarios, such as secure admin access for global teams, compliance for regulated industries (e.g., healthcare, finance), and streamlined dev/test environments, with examples like Metinvest’s global VM management.
  • Best Practices: Tips for deployment (e.g., subnet sizing, VNet peering), security (e.g., MFA, NSG configuration), monitoring (e.g., Azure Monitor logs), and cost management (e.g., SKU selection, scaling strategies).
  • Limitations and Considerations: Key factors like SKU constraints, regional availability for zonal deployments, performance considerations, and cost implications, with guidance on mitigating challenges.

What did you think of this episode? Give us some feedback via our contact form, Or leave us a voice message in the bottom right corner of our site.

Read transcript

Avsnitt(156)

S4E9 - Microsoft Dev Box - Azure hosted development environments

S4E9 - Microsoft Dev Box - Azure hosted development environments

This week we discussed Microsoft Dev Box. Dev Box allows development teams to create development environments for their projects in the cloud. This enables development teams to utilise infrastructure ...

11 Aug 202343min

S4E8 - Zero-touch deployments with Microsoft Intune

S4E8 - Zero-touch deployments with Microsoft Intune

Alan and Sam discuss how Zero-Touch deployments can help organisation reduce the effort needed to build devices. Alan goes through some of the scenarios and the benefits. Here are a few things we cove...

4 Aug 202339min

S4E7 - Azure Automation - Deploy automation across Azure and non-Azure environments

S4E7 - Azure Automation - Deploy automation across Azure and non-Azure environments

This week we discussed Azure Automation. Azure automations allows you develop processes in PowerShell and Python and deploy this content to Azure to manage and orchestrate. Azure automations can run i...

28 Juli 202346min

S4E6 - Introduce Passwordless authentication into your organisation with Microsoft technology

S4E6 - Introduce Passwordless authentication into your organisation with Microsoft technology

Alan and Sam discuss how passwordless authentication can help organisations to improve their authentication health and increase their security posture. Alan explains the concept and the solutions avai...

21 Juli 202344min

S4E5 - Azure Confidential Ledger - Use blockchain to create secure, tamper proof data stores

S4E5 - Azure Confidential Ledger - Use blockchain to create secure, tamper proof data stores

Alan and Sam discuss how Azure Confidential Ledger can help organisations to create private tamper proof stores of data. Sam explains the features of the solution and the benefits that it can bring: ...

14 Juli 202335min

S4E4 - Understand your Cloud Security Posture using Microsoft Defender for Cloud

S4E4 - Understand your Cloud Security Posture using Microsoft Defender for Cloud

Alan and Sam discuss why it is important to have a Cloud Security Posture Management (CSPM) solution in place. Alan explains the benefits of CSPM, and dives into Microsoft Defender for Cloud. Topics t...

7 Juli 202351min

S4E3 - Azure Functions - Build serverless apps in the cloud, focus on code, leave the rest to Azure

S4E3 - Azure Functions - Build serverless apps in the cloud, focus on code, leave the rest to Azure

This week we discuss Azure Functions. Azure Functions allows you to build serverless applications on top of Azure. Serverless functions allow you to bring your code and let Azure handle the hosting an...

30 Juni 202346min

S4E2 - Securing Bring Your Own Devices (BYOD) using Microsoft Technology

S4E2 - Securing Bring Your Own Devices (BYOD) using Microsoft Technology

This week we discuss how to manage Bring Your Own Devices (BYOD) securely in an organisation. With hybrid working on the rise, more flexibility is needed to reduce costs, but not as the compromise of ...

23 Juni 202348min

Populärt inom Teknik

uppgang-och-fall
market-makers
elbilsveckan
skogsforum-podcast
rss-elektrikerpodden
bilar-med-sladd
developers-mer-an-bara-kod
rss-uppgang-och-fall
rss-veckans-ai
rss-laddstationen-med-elbilen-i-sverige
rss-powerboat-sverige-podcast
rss-technokratin
bli-saker-podden
teknikveckan
hej-bruksbil
rss-fabriken-2
natets-morka-sida
gubbar-som-tjotar-om-bilar
har-vi-akt-till-mars-an
rss-snacka-om-ai