We've set up Just-in-Time access to our VM's using Azure Security Center, and also use Bastion to access machines within a subnet.
I assumed everything was locked down securely. However for one public-facing VM, a connection was requested using "All configured IPs", then I saw a rule in NSG created by JIT that opens ports 22, 3389, 5985, 5986 to any IP address.
This appears to be the default behaviour for JIT access requests. Can anyone clarify this is the case please?
If I configure ports myself in the Security Center, are there any IP's used by Azure services (e.g. logs) that need to be accounted for? I'm nervous about being insecure, but mindful Azure itself needs to access the machine in my absense...
Thank you.