Enhancing Remote Access Security
VMs as Jump Boxes
Administrators prefer to use virtual machines (VMs) as jump boxes, because of their low cost, ease of deployment, and ease of maintenance. Virtualization makes creating such services almost trivial. If your team already has a security VM template created, deploying a new jump box only takes a few minutes. Further configuration and setup that is jump box specific will be far less of a hassle if an administrator can deploy a system, set the appropriate VLAN ID, create user accounts, set up MFA, and allow users to connect within a few hours of initial deployment.
A quick Internet search for “jump box” yields quite a few results for deploying jump boxes for Amazon Web Service (AWS) environments. Some of these even outline best practices and caveats for secure setups for AWS.
An additional layer of security is to limit the amount of time the jump box is available for use. For example, if your entire staff is local, then you can restrict access until after regular business hours for a limited window for maintenance. This restriction can be pushed even further by only allowing access during maintenance events rather than every day from 6PM to 7AM.
Summary
A jump box’s sole purpose is provide an SSH gateway into your internal network for administrators, and it should be made as secure as possible. MFA greatly increases security for all systems, not just jump boxes. It’s an added pain for administrators, but the added security layer is worth the few extra seconds required to work with an MFA solution.
Even the largest enterprises use jump boxes and other OOB network access protocols, so there are resources available to help you work through any security issues or configurations. Jump box deployment requires careful planning and close adherence to security best practices for firewalls, operating systems, networks, and users.
« Previous 1 2
Buy Linux Magazine
Direct Download
Read full article as PDF:
News
-
GNOME 40 is Now Available on openSUSE
The rolling release edition of openSUSE, Tumbleweed, now offers the latest version of the GNOME desktop.
-
Apple M1 Hardware Support to be Merged into Linux Kernel 5.13
Linux users will be able to install their favorite distribution on Apple’s M1-based hardware.
-
KDE Launches the Qt 5 Patch Collection
To support and maintain a stable Qt 5 for KDE Gears and Frameworks, KDE will maintain a patch collection.
-
Linux Creator Warns Next Kernel Could be Delayed
Linus Torvalds has issued concern about the size of kernel 5.12 and possible delays for its release.
-
System76 Updates its Pangolin Laptop
System76 has released a much-anticipated AMD version of their most popular laptop, the Pangolin.
-
New Debian-Based Distribution Arrives on the Market
TelOS is a new Debian-based Linux distribution with a customized, touch-screen-ready KDE Plasma 5 desktop.
-
System76 Releases New Thelio Desktop
One of the most ardent supporters of open source hardware has released a new desktop machine for home or office.
-
Mageia 8 Now Available with Linux 5.10 LTS
The latest release of Mageia includes improved graphics support for both AMD and NVIDIA GPUs.
-
GNOME 40 Beta has been Released
Anyone looking to test the beta for the upcoming GNOME 40 release can now do so.
-
OpenMandriva Lx 4.2 has Arrived
The latest stable version of OpenMandriva has been released and offers the newest KDE desktop and ARM support.