cjthedj45 wrote: » Third party server is built (including Logging, File integrity monitoring, Anti Virus) to only permit the specific access they need (Source destination and ports)
GarudaMin wrote: » What are they accessing (applications, data, other systems)? Where does the VPN terminate? Does their activity need to be recorded? Without knowing business requirements or case, it's not easy to give an efficient and accurate recommendation.
lsud00d wrote: » Are you saying this is essentially their non-persistent jumpbox?
lsud00d wrote: » @cjthedj45, thanks for the clarification, your initial description on the process was kinda murky for the last few steps. I was unsure why you'd be spinning up a server for each vendor vs. managing a layer in between. To add to @GarudaMin, CA has a suite of products/technologies for this:CA Privileged Identity Manager - CA Technologies
GarudaMin wrote: » You might be better off using a vendor access management solution/product that uses a gatekeeper type jumpbox method. You don't need to create a server for each vendor access. You define who from what vendor will have access to which system/application. Vendors remote in (two channel authentication) via gatekeeper to their assigned system/application, their activity is recorded and they also won't know what password is being used. I don't use Bomgar so I can't say anything about it. But if you look for "vendor access management" solutions, there are a lot out there. But you can also take it one step further and look into products/solutions for "privilege session management". You have more granular control in that you can assign only certain applications on a system for vendor use (they won't see anything else). Privilege session management is also good for managing your privileged accounts (domain accounts). You can also management automatic password management of service accounts as well.