Skip to content

Commit 50de37f

Browse files
committed
added aws
1 parent 7c897d6 commit 50de37f

File tree

3 files changed

+20
-35
lines changed

3 files changed

+20
-35
lines changed

articles/defender-for-cloud/just-in-time-access-overview.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,8 @@
11
---
22
title: Understanding just-in-time virtual machine access in Microsoft Defender for Cloud
33
description: This document explains how just-in-time VM access in Microsoft Defender for Cloud helps you control access to your Azure virtual machines
4-
author: bmansheim
5-
ms.author: benmansheim
64
ms.topic: how-to
7-
ms.date: 11/09/2021
5+
ms.date: 05/12/2022
86
---
97

108
# Understanding just-in-time (JIT) VM access
@@ -13,13 +11,10 @@ This page explains the principles behind Microsoft Defender for Cloud's just-in-
1311

1412
To learn how to apply JIT to your VMs using the Azure portal (either Defender for Cloud or Azure Virtual Machines) or programmatically, see [How to secure your management ports with JIT](just-in-time-access-usage.md).
1513

16-
1714
## The risk of open management ports on a virtual machine
1815

1916
Threat actors actively hunt accessible machines with open management ports, like RDP or SSH. All of your virtual machines are potential targets for an attack. When a VM is successfully compromised, it's used as the entry point to attack further resources within your environment.
2017

21-
22-
2318
## Why JIT VM access is the solution
2419

2520
As with all cybersecurity prevention techniques, your goal should be to reduce the attack surface. In this case, that means having fewer open ports, especially management ports.
@@ -28,11 +23,9 @@ Your legitimate users also use these ports, so it's not practical to keep them c
2823

2924
To solve this dilemma, Microsoft Defender for Cloud offers JIT. With JIT, you can lock down the inbound traffic to your VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
3025

26+
## How JIT operates with network resources
3127

32-
33-
## How JIT operates with network security groups and Azure Firewall
34-
35-
When you enable just-in-time VM access, you can select the ports on the VM to which inbound traffic will be blocked. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
28+
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
3629

3730
If other rules already exist for the selected ports, then those existing rules take priority over the new "deny all inbound traffic" rules. If there are no existing rules on the selected ports, then the new rules take top priority in the NSG and Azure Firewall.
3831

@@ -41,20 +34,22 @@ When a user requests access to a VM, Defender for Cloud checks that the user has
4134
> [!NOTE]
4235
> JIT does not support VMs protected by Azure Firewalls controlled by [Azure Firewall Manager](../firewall-manager/overview.md). The Azure Firewall must be configured with Rules (Classic) and cannot use Firewall policies.
4336
44-
45-
46-
4737
## How Defender for Cloud identifies which VMs should have JIT applied
4838

4939
The diagram below shows the logic that Defender for Cloud applies when deciding how to categorize your supported VMs:
5040

41+
### [**Azure**](#tab/defender-for-container-arch-aks)
5142
[![Just-in-time (JIT) virtual machine (VM) logic flow.](media/just-in-time-explained/jit-logic-flow.png)](media/just-in-time-explained/jit-logic-flow.png#lightbox)
5243

44+
### [**AWS**](#tab/defender-for-container-arch-eks)
45+
:::image type="content" source="media/just-in-time-explained/aws-jit-logic-flow.png" alt-text="A chart that explains the logic flow for the AWS Just in time (JIT) virtual machine (VM) logic flow.":::
46+
47+
---
48+
5349
When Defender for Cloud finds a machine that can benefit from JIT, it adds that machine to the recommendation's **Unhealthy resources** tab.
5450

5551
![Just-in-time (JIT) virtual machine (VM) access recommendation.](./media/just-in-time-explained/unhealthy-resources.png)
5652

57-
5853
## FAQ - Just-in-time virtual machine access
5954

6055
### What permissions are needed to configure and use JIT?
@@ -65,6 +60,8 @@ JIT Requires [Microsoft Defender for Servers Plan 2](defender-for-servers-introd
6560

6661
If you want to create custom roles that can work with JIT, you'll need the details from the table below.
6762

63+
If you are setting up JIT on your Amazon Web Service (AWS) VM, you will need to [connect your AWS account](quickstart-onboard-aws.md) to Microsoft Defender for Cloud.
64+
6865
> [!TIP]
6966
> To create a least-privileged role for users that need to request JIT access to a VM, and perform no other JIT operations, use the [Set-JitLeastPrivilegedRole script](https://github.com/Azure/Azure-Security-Center/tree/main/Powershell%20scripts/JIT%20Scripts/JIT%20Custom%20Role) from the Defender for Cloud GitHub community pages.
7067
@@ -74,7 +71,8 @@ If you want to create custom roles that can work with JIT, you'll need the detai
7471
|Request JIT access to a VM | *Assign these actions to the user:* <ul><li> `Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action` </li><li> `Microsoft.Security/locations/jitNetworkAccessPolicies/*/read` </li><li> `Microsoft.Compute/virtualMachines/read` </li><li> `Microsoft.Network/networkInterfaces/*/read` </li> <li> `Microsoft.Network/publicIPAddresses/read` </li></ul> |
7572
|Read JIT policies| *Assign these actions to the user:* <ul><li>`Microsoft.Security/locations/jitNetworkAccessPolicies/read`</li><li>`Microsoft.Security/locations/jitNetworkAccessPolicies/initiate/action`</li><li>`Microsoft.Security/policies/read`</li><li>`Microsoft.Security/pricings/read`</li><li>`Microsoft.Compute/virtualMachines/read`</li><li>`Microsoft.Network/*/read`</li>|
7673

77-
74+
> [!Note]
75+
> Only the `Microsoft.Security` permissions are relevant for AWS.
7876
7977
## Next steps
8078

articles/defender-for-cloud/just-in-time-access-usage.md

Lines changed: 7 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Just-in-time virtual machine access in Microsoft Defender for Cloud | Microsoft Docs
33
description: Learn how just-in-time VM access (JIT) in Microsoft Defender for Cloud helps you control access to your Azure virtual machines.
44
ms.topic: how-to
5-
ms.date: 01/06/2022
5+
ms.date: 05/12/2022
66
---
77
# Secure your management ports with just-in-time access
88

@@ -14,19 +14,18 @@ For a full explanation of the privilege requirements, see [What permissions are
1414

1515
This page teaches you how to include JIT in your security program. You'll learn how to:
1616

17-
- **Enable JIT on your VMs** - You can enable JIT with your own custom options for one or more VMs using Defender for Cloud, PowerShell, or the REST API. Alternatively, you can enable JIT with default, hard-coded parameters, from Azure virtual machines. When enabled, JIT locks down inbound traffic to your Azure VMs by creating a rule in your network security group.
17+
- **Enable JIT on your VMs** - You can enable JIT with your own custom options for one or more VMs using Defender for Cloud, PowerShell, or the REST API. Alternatively, you can enable JIT with default, hard-coded parameters, from Azure virtual machines. When enabled, JIT locks down inbound traffic to your Azure and AWS VMs by creating a rule in your network security group.
1818
- **Request access to a VM that has JIT enabled** - The goal of JIT is to ensure that even though your inbound traffic is locked down, Defender for Cloud still provides easy access to connect to VMs when needed. You can request access to a JIT-enabled VM from Defender for Cloud, Azure virtual machines, PowerShell, or the REST API.
1919
- **Audit the activity** - To ensure your VMs are secured appropriately, review the accesses to your JIT-enabled VMs as part of your regular security checks.
2020

2121
## Availability
2222

23-
|Aspect|Details|
24-
|----|:----|
25-
| Release state: | General availability (GA) |
26-
| Supported VMs: | :::image type="icon" source="./media/icons/yes-icon.png"::: VMs deployed through Azure Resource Manager.<br>:::image type="icon" source="./media/icons/no-icon.png"::: VMs deployed with classic deployment models. [Learn more about these deployment models](../azure-resource-manager/management/deployment-models.md).<br>:::image type="icon" source="./media/icons/no-icon.png"::: VMs protected by Azure Firewalls<sup>[1](#footnote1)</sup> controlled by [Azure Firewall Manager](../firewall-manager/overview.md). |
23+
| Aspect | Details |
24+
|--|:-|
25+
| Release state: | General availability (GA) |
26+
| Supported VMs: | :::image type="icon" source="./media/icons/yes-icon.png"::: VMs deployed through Azure Resource Manager.<br>:::image type="icon" source="./media/icons/no-icon.png"::: VMs deployed with classic deployment models. [Learn more about these deployment models](../azure-resource-manager/management/deployment-models.md).<br>:::image type="icon" source="./media/icons/no-icon.png"::: VMs protected by Azure Firewalls<sup>[1](#footnote1)</sup> controlled by [Azure Firewall Manager](../firewall-manager/overview.md). <br> :::image type="icon" source="./media/icons/yes-icon.png"::: AWS EC2 instances |
2727
| Required roles and permissions: | **Reader** and **SecurityReader** roles can both view the JIT status and parameters.<br>To create custom roles that can work with JIT, see [What permissions are needed to configure and use JIT?](just-in-time-access-overview.md#what-permissions-are-needed-to-configure-and-use-jit).<br>To create a least-privileged role for users that need to request JIT access to a VM, and perform no other JIT operations, use the [Set-JitLeastPrivilegedRole script](https://github.com/Azure/Azure-Security-Center/tree/main/Powershell%20scripts/JIT%20Scripts/JIT%20Custom%20Role) from the Defender for Cloud GitHub community pages. |
28-
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)<br>:::image type="icon" source="./media/icons/no-icon.png"::: Connected AWS accounts |
29-
28+
| Clouds: | :::image type="icon" source="./media/icons/yes-icon.png"::: Commercial clouds<br>:::image type="icon" source="./media/icons/yes-icon.png"::: National (Azure Government, Azure China 21Vianet)<br>:::image type="icon" source="./media/icons/yes-icon.png"::: Connected AWS accounts (Preview) |
3029

3130
<sup><a name="footnote1"></a>1</sup> For any VM protected by Azure Firewall, JIT will only fully protect the machine if it's in the same VNET as the firewall. VMs using VNET peering will not be fully protected.
3231

@@ -88,8 +87,6 @@ From Defender for Cloud, you can enable and configure the JIT VM access.
8887

8988
1. Select **Save**.
9089

91-
92-
9390
### Edit the JIT configuration on a JIT-enabled VM using Defender for Cloud <a name="jit-modify"></a>
9491

9592
You can modify a VM's just-in-time configuration by adding and configuring a new port to protect for that VM, or by changing any other setting related to an already protected port.
@@ -106,8 +103,6 @@ To edit the existing JIT rules for a VM:
106103

107104
1. When you've finished editing the ports, select **Save**.
108105

109-
110-
111106
### [**Azure virtual machines**](#tab/jit-config-avm)
112107

113108
### Enable JIT on your VMs from Azure virtual machines
@@ -239,8 +234,6 @@ When a VM has a JIT enabled, you have to request access to connect to it. You ca
239234
> [!NOTE]
240235
> If a user who is requesting access is behind a proxy, the option **My IP** may not work. You may need to define the full IP address range of the organization.
241236
242-
243-
244237
### [**Azure virtual machines**](#tab/jit-request-avm)
245238
246239
### Request access to a JIT-enabled VM from the Azure virtual machine's connect page
@@ -265,8 +258,6 @@ To request access from Azure virtual machines:
265258
> [!NOTE]
266259
> After a request is approved for a VM protected by Azure Firewall, Defender for Cloud provides the user with the proper connection details (the port mapping from the DNAT table) to use to connect to the VM.
267260
268-
269-
270261
### [**PowerShell**](#tab/jit-request-powershell)
271262
272263
### Request access to a JIT-enabled VM using PowerShell
@@ -300,8 +291,6 @@ Run the following in PowerShell:
300291
301292
Learn more in the [PowerShell cmdlet documentation](/powershell/scripting/developer/cmdlet/cmdlet-overview).
302293
303-
304-
305294
### [**REST API**](#tab/jit-request-api)
306295
307296
### Request access to a JIT-enabled VMs using the REST API
@@ -328,8 +317,6 @@ You can gain insights into VM activities using log search. To view the logs:
328317
329318
1. To download the log information, select **Download as CSV**.
330319
331-
332-
333320
## Next steps
334321
335322
In this article, you learned _how_ to configure and use just-in-time VM access. To learn _why_ JIT should be used, read the concept article explaining the threats it defends against:
43.2 KB
Loading

0 commit comments

Comments
 (0)