azure|January 10, 2018|1 min read

Microsoft Azure Just-In-Time access control

TL;DR

JIT access lets you open VM ports for a specific time window via the Azure portal or PowerShell. The rule auto-deletes when time expires — no more forgotten open ports.

Microsoft Azure Just-In-Time access control

According to Microsoft,

Login brute forcing is one of the top ways IaaS VMs are compromised in the cloud.

Therefore, they recently posted about a feature in beta called, ”Just in Time” (JIT) access. The premise is that, rather than leaving a port open 24/7, you instead create temporary firewall rules for only the time span for which you need them. The system will automatically delete the firewall rule once the time expires.

It is not uncommon for a security incident to be the result of a developer temporarily adding a firewall rule to work through an issue and then forgetting to delete the rule once they are done. By allowing permissions to be time bound, it removes the step of having to remember to go back and delete the rule in scenarios where you only need the rule for a few hours or a few days.

Harden Your Azure Infrastructure Using Azure Security Center Just-In-Time VM Access https://blogs.msdn.microsoft.com/mvpawardprogram/2018/01/09/just-in-time-access-azure-vms/

Just-in-Time VM Access can be requested using the Azure Portal or by PowerShell based on Role Based Access Control (RBAC) permissions. On the Configured tab you select the VM you want to access and click to Request access.

Then you select the ports and time range. And you’re done.

Related Posts

How to renew SSL certificate from Lets-encrypt when your website is using cloudflare

How to renew SSL certificate from Lets-encrypt when your website is using cloudflare

Lets-Encrypt SSL Certificate Useful Commands

Lets-Encrypt SSL Certificate Useful Commands

You might need to put sudo before above command. The command will show details…

Lets Encrypt SSL Error: The client lacks sufficient authorization 403 Forbidden

Lets Encrypt SSL Error: The client lacks sufficient authorization 403 Forbidden

This is due to our web server are configured to deny accessing this directory…

Dockerfile for building Python 3.9.2 and Openssl for FIPS

Dockerfile for building Python 3.9.2 and Openssl for FIPS

Introduction In previous posts, we saw how to build FIPS enabled Openssl, and…

How to Patch and Build Python 3.9.x for FIPS enabled Openssl

How to Patch and Build Python 3.9.x for FIPS enabled Openssl

Introduction In this post, we will see Python 3.9.x patch for FIPS enabled…

How to build FIPS enabled Openssl in docker

How to build FIPS enabled Openssl in docker

Introduction In this post, we will see how we can build FIPS enabled openssl in…

Latest Posts

Claude Code Skills — Build a Better Engineering Workflow with AI-Powered Code Reviews, Security Scans, and More

Claude Code Skills — Build a Better Engineering Workflow with AI-Powered Code Reviews, Security Scans, and More

Most developers use Claude Code like a search engine — ask a question, get an…

Building an AI Voicebot for Visitor Check-In — A Practical Guide to Handling the Messy Parts

Building an AI Voicebot for Visitor Check-In — A Practical Guide to Handling the Messy Parts

Every office lobby has the same problem: a visitor walks in, nobody’s at the…

Server Security Best Practices — Complete Hardening Guide for Production Systems

Server Security Best Practices — Complete Hardening Guide for Production Systems

Every breach post-mortem tells the same story: an unpatched service, a…

Staff Engineer Study Plan for MAANG Interviews — The Complete 12-Week Roadmap

Staff Engineer Study Plan for MAANG Interviews — The Complete 12-Week Roadmap

If you’re a Senior Engineer (L5) preparing for Staff (L6+) roles at MAANG…

XSS and CSRF Explained — The Complete Guide with Real Attack Examples and Defenses

XSS and CSRF Explained — The Complete Guide with Real Attack Examples and Defenses

XSS and CSRF have been in the OWASP Top 10 for over a decade. They’re among the…

OWASP Top 10 (2021) — Every Vulnerability Explained with Code

OWASP Top 10 (2021) — Every Vulnerability Explained with Code

The OWASP Top 10 is the industry standard for web application security risks. If…