Skip to content

Commit 610d35c

Browse files
committed
final changes and release note added
1 parent 6a7805e commit 610d35c

File tree

2 files changed

+12
-9
lines changed

2 files changed

+12
-9
lines changed

articles/defender-for-cloud/just-in-time-access-overview.md

Lines changed: 4 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -23,23 +23,19 @@ Your legitimate users also use these ports, so it's not practical to keep them c
2323

2424
To solve this dilemma, Microsoft Defender for Cloud offers JIT. With JIT, you can lock down the inbound traffic to your VMs, reducing exposure to attacks while providing easy access to connect to VMs when needed.
2525

26-
## How JIT operates with network resources
27-
28-
### In Azure
26+
## How JIT operates with network resources in Azure and AWS
2927

3028
In Azure, you can block inbound traffic on specific ports, by enabling just-in-time VM access. Defender for Cloud ensures "deny all inbound traffic" rules exist for your selected ports in the [network security group](../virtual-network/network-security-groups-overview.md#security-rules) (NSG) and [Azure Firewall rules](../firewall/rule-processing.md). These rules restrict access to your Azure VMs’ management ports and defend them from attack.
3129

3230
If other rules already exist for the selected ports, then those existing rules take priority over the new "deny all inbound traffic" rules. If there are no existing rules on the selected ports, then the new rules take top priority in the NSG and Azure Firewall.
3331

34-
When a user requests access to a VM, Defender for Cloud checks that the user has [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md) permissions for that VM. If the request is approved, Defender for Cloud configures the NSGs and Azure Firewall to allow inbound traffic to the selected ports from the relevant IP address (or range), for the amount of time that was specified. After the time has expired, Defender for Cloud restores the NSGs to their previous states. Connections that are already established are not interrupted.
32+
In AWS, by enabling JIT-access the relevant rules in the attached EC2 security groups, for the selected ports, are revoked which blocks inbound traffic on those specific ports.
33+
34+
When a user requests access to a VM, Defender for Cloud checks that the user has [Azure role-based access control (Azure RBAC)](../role-based-access-control/role-assignments-portal.md) permissions for that VM. If the request is approved, Defender for Cloud configures the NSGs and Azure Firewall to allow inbound traffic to the selected ports from the relevant IP address (or range), for the amount of time that was specified. In AWS, Defender for Cloud creates a new EC2 security group that allow inbound traffic to the specified ports. After the time has expired, Defender for Cloud restores the NSGs to their previous states. Connections that are already established are not interrupted.
3535

3636
> [!NOTE]
3737
> JIT does not support VMs protected by Azure Firewalls controlled by [Azure Firewall Manager](../firewall-manager/overview.md). The Azure Firewall must be configured with Rules (Classic) and cannot use Firewall policies.
3838
39-
### In AWS
40-
41-
In AWS, JIT deletes allow rules and for EC2 Security Groups. When a user requests access, JIT creates a temporary security group with relevant allow rules.
42-
4339
## How Defender for Cloud identifies which VMs should have JIT applied
4440

4541
The diagram below shows the logic that Defender for Cloud applies when deciding how to categorize your supported VMs:

articles/defender-for-cloud/release-notes.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Release notes for Microsoft Defender for Cloud
33
description: A description of what's new and changed in Microsoft Defender for Cloud
44
ms.topic: reference
5-
ms.date: 05/12/2022
5+
ms.date: 05/15/2022
66
---
77

88
# What's new in Microsoft Defender for Cloud?
@@ -22,6 +22,7 @@ Updates in May include:
2222

2323
- [General availability (GA) of Defender for SQL for AWS and GCP environments](#general-availability-ga-of-defender-for-sql-for-aws-and-gcp-environments)
2424
- [Multi-cloud settings of Servers plan are now available in connector level](#multi-cloud-settings-of-servers-plan-are-now-available-in-connector-level)
25+
- JIT is now available with AWS
2526

2627
### General availability (GA) of Defender for SQL for AWS and GCP environments
2728

@@ -49,6 +50,12 @@ Updates in the UI include a reflection of the selected pricing tier and the requ
4950

5051
:::image type="content" source="media/release-notes/auto-provision.png" alt-text="Screenshot of the auto-provision page with the multi-cloud connector enabled.":::
5152

53+
### Jit is now available with AWS
54+
55+
We would like to announce that Just-in-Time VM access (JIT) is now available to protect your AWS EC2 instances.
56+
57+
Learn how to [JIT protects](just-in-time-access-overview.md#how-jit-operates-with-network-resources) your AWS EC2 instances.
58+
5259
## April 2022
5360

5461
Updates in April include:

0 commit comments

Comments
 (0)