TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Is the Bastion Host Security Pattern Outdated?

3 pointsby cothompsover 11 years ago
Following on to this article:<p>http:&#x2F;&#x2F;programming.oreilly.com&#x2F;2014&#x2F;01&#x2F;is-the-jump-box-obsolete.html?cmp=tw-prog-na-article-pr_is_the_jump_box_obsolete<p>The article proposes that the Jump Box &#x2F; Bastion Host pattern is obsolete for many cloud deployments. I&#x27;ve been using a &#x27;bastion host&#x27; pattern to access Amazon VPCs - and while the security &#x2F; IP infrastructure is somewhat simpler to maintain, there really is no way to audit user access; the AWS EC2 private key infrastructure and bastion host pattern pretty much ensure every user runs as &#x27;root&#x27;.<p>Are there better alternative for AWS (or other IaaS services in general) than the bastion host pattern?

1 comment

ahazred8taover 11 years ago
Well, that article was written by the head of this company <a href="https://www.jumpcloud.com/about/" rel="nofollow">https:&#x2F;&#x2F;www.jumpcloud.com&#x2F;about&#x2F;</a> that sells an SaaS solution that builds on Chef and Puppet. More generally speaking, each DevOps framework has its own integrated solution for user account provisioning &#x2F; security. Also see: 13 Practical and Tactical Cloud Security Controls in EC2 <a href="http://www.tuicool.com/articles/NbIz6z" rel="nofollow">http:&#x2F;&#x2F;www.tuicool.com&#x2F;articles&#x2F;NbIz6z</a>