Jump hosts are typical used for remote access. These are controls:

  • User accounts with multi-factor authentication
  • Time of day granted to this user account
  • Ruleset to limit destination hosts when landed; and per login user
  • Session monitoring

On reasonable ground, some are mandatory while other extra measures depend. In extreme cases, multiple jump hosts are demanded that whether network latency, usability are at doubt.

The optimal decision is to balance risk and usability with a hoslistic and objective assessment. Otherwise, it will be overkilled.

Leave a Reply