Session

No Port? No Problem! Bastion Has Your Back

Remote Desktop Protocol (RDP) remains one of the most exploited attack vectors in corporate environments, making its security a critical concern. While RDP was never designed as a primary server administration tool, it remains widely used – often leading to security vulnerabilities. It's not just RDP; you wouldn't want to expose SSH either.

What can be done to secure remote access? We can use PaaS, SaaS, or even disable remote access altogether. However, in many cases, these solutions simply aren’t feasible. Enter Azure Bastion, a fully managed service that eliminates the need to expose ports or public IPs outside your virtual network.

In this session, we'll examine issues that arise when exposing Virtual Machines and why that’s a practice best avoided. We’ll look into statistics on attacks that exploit remote access protocols and explore how Azure Bastion can help remediate these issues. We’ll explore Azure Bastion’s different offerings and key considerations for designing your own setup.

Session length: 35-50 minutes

Jukka Loikkanen

Azure MVP, MCT, Senior Cloud Consultant at CGI

Helsinki, Finland

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top