Stepping Stone #2
Jump hosts are typical used for remote access. These are controls:
User accounts with multi-factor authenticationTime of day granted to this user accountRuleset to limit destination hosts when landed; and per login userSession monitoring
On reasonable ground, some are mandatory while other extra measures depend. In extreme cases, multiple jump hosts are demanded that whether network latency, usability are at doubt.
The optimal decision is to balance risk and usability with a hoslistic and objective assessment. Otherwise, it will be overkilled.
...