Turbot, the world leader in Software Defined Operations, continues to offer new Guardrails to ensure that your cloud infrastructure is secure, compliant, scalable, and cost optimized.
Turbot automates and enforces a combination of preventive and detective controls that provide Guardrails at the Networking, Infrastructure, Operating System, Database, and Application layers while giving Application Teams direct access and management of their own AWS, Azure, and GCP environments.
With over 1000 Guardrails available to Turbot Customers and spring-boarding off of our current support for Linux AWS EC2 instances, Turbot now offers Guardrails to support Microsoft Azure Linux Virtual Machines.
The Turbot Microsoft Linux Azure Guardrails for Virtual Machines fall into two groups: Connecting to the Linux VM and Linux VM Management
Connecting to the Linux VM
Before Turbot can manage a Microsoft Azure Linux VM, it is necessary for the VM to exist in the customer environment and for Turbot to establish a secure connection to the VM. The overall connection process works like this:
- Administrators allow Microsoft Azure VMs to exist through the VM Approved Guardrail.
- Administrators define the Turbot Linux roles (e.g., Linux/Admin, Linux/Owner) to allow users to create Linux VMs.
- The user creates the VM using a Linux image that Microsoft Azure provides.
- Turbot creates an extension for the VM the user creates.
- Turbot connects to the VM using SSH.
Linux VM Management
After Turbot creates a secure connection to the Microsoft Azure Linux VM, the newest Turbot Guardrails offer the following capabilities:
- User management
- CIS security hardening
- Environment and DNS management
The Turbot Linux roles apply to users to ensure that only the correct users can create approved VMs. This Guardrail helps organizations ensure that isolated VMs do not exist to provide unauthorized entry points and can help to reduce the cost associated with unmonitored VMs that are never shut down.
The first time a user creates an approved VM, Turbot applies all of the necessary patches to make sure the VM is in the most optimal state. Turbot provides a Guardrail to schedule Linux VM patching to automate the process to update the VM to its best possible state.
CIS security hardening
Turbot places a premium on security and now provides a Guardrail to apply CIS hardening to VMs. Administrators can apply the CIS hardening to individual VMs or at any level in the Turbot hierarchy.
Environment and DNS management
Turbot offers a Guardrail to configure the DNS search suffix to target the Microsoft Azure virtual network where the VM resides. After reboot, the DNS search suffix adheres to the VM instance in the virtual network. Turbot also updates timezone settings and other environment variables to ensure optimum VM availability and configuration.