What is a Bastion Host?

A bastion host is a specially hardened server that serves as an entry point to an internal network. It acts as a controlled gateway between an untrusted network (e.g. the internet or IT) and a secured OT network, and is often used for remote management.

In OT environments, a bastion host prevents direct access to PLC, SCADA or Engineering Station from untrusted Zones.


🧠 How does a bastion host work?

  1. External user signs in to the bastion host
  • Via SSH, RDP or a web interface
  1. Authentication and verification
  1. Access to internal systems
  • The bastion host connects to OT resources on the user’s behalf

Key characteristics:

  • A single entry point for management
  • Isolated from other systems
  • Full monitoring and logging available
  • Typically a β€œhardened” OS without unnecessary services

Think of a bastion host as a digital security airlock between IT and OT.


🏭 Use of bastion hosts in OT networks

Bastion hosts are essential for enforcing Zero Trust access in OT environments.


πŸ” Bastion host vs. jump server

Aspect Bastion host Jump server
Purpose Secure access gateway Connection bridge between zones
Security Heightened (hardened, minimal attack surface) Depends on implementation
Logging & audit Standard Optional
Use in OT Front-end access point for external connections Internal bridge between OT segments

πŸ” Security considerations

  • MFA required to sign in to the bastion host
  • SIEM integration for real-time monitoring
  • Access only from whitelisted IPs and ports
  • Regularly updated and patched
  • Firewall rules limit traffic between bastion and OT
  • Full session logging and recording for compliance

A bastion host is effective when it is tightly managed, narrowly accessible and well-monitored.


πŸ“Œ In summary

A bastion host is a critical component in an OT security architecture, providing controlled, logged and secure access to internal systems. It prevents direct connections and reinforces access management at a central point.