Talk With an Expert

Hardening Bastion Hosts

Hardening Bastion Hosts (PDF, 1.64MB)Published: 03 Jul, 2001
Created by
Todd Jenkins

This paper discusses some of the benefits to using hardened bastion hosts. These hosts allow you to have complete control over how each service interacts with the network. They also allow you to monitor activity to prevent unauthorized access. By adding them to your Defense in Depth strategy, you can slow an attackers progress and protect the confidentiality, integrity and availability of your private network.