ADR-003 - Controlled Administrative Access via Bastion
Context
At the current stage, administrative access to systems is partially performed:
- from a personal workstation
- via direct SSH access to exposed systems
This creates several risks:
- lack of centralized control over administrative sessions
- limited traceability of actions
- increased exposure of privileged access paths
- inconsistent enforcement of authentication policies
This situation is identified as temporary and not aligned with target architecture principles.
Decision
Introduce a controlled administrative access model based on a bastion host:
- all administrative access must transit through the bastion
- direct access to infrastructure systems is restricted or removed
- authentication is strengthened (SSH keys, MFA where possible)
- administrative sessions become auditable
Rationale
-
Controlled access paths
Centralizes and restricts privileged access. -
Traceability
Enables logging and monitoring of administrative actions. -
Reduced exposure
Limits direct access from external or uncontrolled environments. -
Alignment with architecture principles
Reinforces segmentation and trust boundary enforcement.
Alternatives Considered
1. Direct SSH access with hardening
Rejected
Still exposes multiple administrative entry points.
2. VPN-only access model
Partially acceptable but insufficient alone
Does not provide session-level control or traceability.
3. Bastion-based access control (selected)
Accepted
Provides centralized, auditable and controlled access path.
Security Impact
Positive
- reduced attack surface for administrative access
- improved traceability and auditability
- stronger authentication enforcement
- better separation between user and admin contexts
Negative / Trade-offs
- added operational complexity
- dependency on bastion availability
- need for secure bastion hardening
Implementation Notes
- deploy bastion host in a controlled zone (Hell)
- restrict SSH access on all systems to bastion only
- enforce key-based authentication
- progressively introduce MFA
- implement session logging where feasible
Evidence & Traceability
Linked to:
- risks involving credential compromise or misuse
- identity and access management documentation
- future audit and access review processes
Current Maturity
At the current stage, administrative access control is considered partially implemented.
Established
- identification of risks related to admin access
- definition of target bastion-based model
In Progress
- deployment of bastion host
- progressive restriction of direct access paths
- initial hardening of administrative access
Planned / Next Phase
- full enforcement of bastion-only access
- MFA generalization
- session traceability and logging improvements