Ensure there is a bastion host configured to allow secure remote access to the virtual machine (VM) instances running within your Microsoft Azure cloud account. Azure Bastion service enables secure remote access to virtual machines without exposing them directly to the Internet. Additionally, Azure Bastion adheres to hardened configurations within an organization's Microsoft Entra ID service, further enhancing security measures.
excellence
Azure Bastion offers organizations a secure method of accessing their virtual machines (VMs) over the Internet without the need to assign public IP addresses to those VMs. With Azure Bastion, organizations can conveniently access VM instances using Remote Desktop Protocol (RDP) and Secure Shell (SSH) via TLS within a web browser. This eliminates the requirement to expose the TCP ports 3389 and 22 to the Internet. Furthermore, the service provides additional advantages such as Multi-Factor Authentication (MFA), Conditional Access Policies, and other security hardening measures configured within Microsoft Entra ID. By utilizing Azure Bastion as a central point of access, organizations can enhance the security posture of their Azure cloud environment while simplifying remote access to virtual machines.
Audit
To determine if there are any bastion hosts provisioned within your Microsoft Azure cloud account, perform the following operations:
Remediation / Resolution
To create Azure Bastion host machines in order to enforce secure web-based access to your Azure virtual machine (VM) instances, perform the following operations:
References
- Azure Official Documentation
- What is Azure Bastion?
- Azure Bastion FAQ
- Quickstart: Deploy Azure Bastion automatically
- Tutorial: Deploy Azure Bastion by using specified settings
- Azure Command Line Interface (CLI) Documentation
- az account list
- az account set
- az network bastion list
- az network vnet create
- az network public-ip create
- az network bastion create