Architecture Module 04

Jump-BoxDesign Pattern

Master the jump-box security model and learn how Delinea's Distributed Engine replaces traditional jump servers with a credential-injecting proxy architecture โ€” delivering full session auditability without exposing credentials or creating lateral movement paths.

4
Core Sections
~35
Min Read Time
100%
Zero-Trust Aligned
8
Quiz Questions

The Role of a Jump Box

A jump box (or bastion host) is a hardened, single-entry intermediary that controls all access into an isolated or high-security network segment. Understanding its purpose is the foundation of any PAM architecture.

Definition: A jump box (jump server, bastion host) is a dedicated, hardened node positioned at the boundary between an untrusted zone and a protected network segment. All privileged access must pass through it โ€” creating a single, monitored choke point.

๐Ÿ›ก
Network Isolation

High-security zones (production databases, OT/SCADA, PCI scope, cloud management planes) are kept off the corporate network. The jump box is the only authorized gateway in โ€” all other inbound routes are blocked by firewall rules.

๐Ÿ”
Single Audit Point

By funneling every privileged session through one controlled node, organizations can log, inspect, and record all access. Without a jump box, session telemetry is scattered across dozens of endpoints.

๐Ÿšง
Attack Surface Reduction

Target systems run minimal services and accept connections from the jump box IP only. This dramatically limits the blast radius of a compromised endpoint โ€” the attacker still needs to pivot through the hardened gateway.

โš ๏ธ
Credential Control

Rather than handing out server passwords to individual admins, credentials can be injected transparently at the jump box โ€” meaning no human ever sees or holds the actual secret.

// FIGURE 1 โ€” JUMP BOX NETWORK TOPOLOGY
UNTRUSTED ZONE CONTROLLED BOUNDARY SECURE SEGMENT ๐Ÿ‘ค ADMIN endpoint ๐Ÿ”ท JUMP BOX BASTION HOST mfa ยท logging ยท acl ๐Ÿ–ฅ DB SERVER 10.0.1.20 โš™๏ธ APP SERVER 10.0.1.40 FIREWALL FIREWALL SSH/RDP BLOCKED

When Jump Boxes Are Required

Certain environments and compliance frameworks mandate jump-box architecture as a compensating control.

๐Ÿฆ
PCI DSS Cardholder Data Environments
Requirement 7 & 8 mandate that all access to the CDE traverse through a controlled path with logging and MFA.
MANDATORY
โšก
OT / SCADA & Industrial Control Systems
Air-gapped operational networks require a jump box to bridge maintenance access from the IT network without exposing ICS protocols.
MANDATORY
โ˜๏ธ
Cloud Management & Hypervisor Planes
Direct internet access to hypervisor APIs or cloud console is prohibited. A hardened VPC bastion is the only authorized path.
STRONGLY RECOMMENDED
๐Ÿฅ
HIPAA ePHI Repositories
Audit log requirements for all access to electronic Protected Health Information favor channeling via a centralized proxy node.
STRONGLY RECOMMENDED
๐Ÿ”ฌ
Research & Development / IP Zones
Preventing unauthorized exfiltration from R&D segments via session inspection at the jump layer is a common enterprise control.
BEST PRACTICE

Delinea Distributed Engine

Delinea's Distributed Engine (DE) replaces the traditional jump server with a credential-injecting proxy that brokers sessions transparently โ€” eliminating credential exposure while maintaining full control and auditability.

Traditional Problem: Classic jump boxes require admins to know the target system's credentials, sign into the jump server interactively, and then connect onward โ€” creating a two-hop credential exposure chain. Delinea's architecture eliminates both hops as a credential risk.

How the Proxy Architecture Works

01

Admin Initiates Session via Secret Server

The admin requests access to a target system through the Delinea Secret Server web UI or launcher. No credentials are displayed or transmitted to the admin's endpoint โ€” the request is purely a workflow authorization event.

02

Distributed Engine Receives the Proxied Connection

Secret Server instructs the Distributed Engine โ€” deployed inside the target network segment โ€” to accept the inbound tunneled session. The DE lives inside the firewall perimeter, requiring only an outbound HTTPS port 443 to communicate with Secret Server (no inbound rules needed).

03

Credential Injection at the Protocol Level

The DE retrieves the target credential from the Secret Server vault and injects it at the protocol level (SSH, RDP, SQL). The admin's RDP or SSH client connects to the DE, which presents an authenticated session to the target โ€” the actual password or key is never passed to the client workstation.

04

Session Proxied & Recorded in Real Time

All traffic flows through the DE, enabling byte-level session recording, keystroke logging, and live session monitoring. Administrators can view or terminate live sessions from the Secret Server dashboard.

05

Credential Rotated Post-Session

Upon session termination, Secret Server's Remote Password Changer automatically rotates the target credential, making any captured session token useless for subsequent access.

// FIGURE 2 โ€” DELINEA DISTRIBUTED ENGINE PROXY FLOW
๐Ÿ‘ฉโ€๐Ÿ’ป ADMIN no credentials endpoint ๐Ÿ” SECRET SERVER vault ยท policy ยท workflow ๐Ÿ”ท DISTRIBUTED ENGINE proxy ยท inject ยท record inside target segment ๐Ÿ–ฅ TARGET SSH / RDP request access cred injection tunneled session (HTTPS/443) authenticated SSH/RDP NETWORK BOUNDARY Session tunnel Credential/control Authenticated protocol

Deploying the Distributed Engine

Installing the DE inside a target segment requires no inbound firewall rules. The engine initiates all communication outbound over HTTPS.

Download the Distributed Engine installer from the Secret Server admin portal. Run on a Windows Server 2019+ host with 4GB RAM minimum, positioned inside the target network segment.

DE-install.ps1
# Run as Administrator on the DE host
$installer = "DistributedEngine_Installer.exe"
$ssUrl = "https://vault.corp.local/SecretServer"
$siteId = "3" # Site ID from SS Admin > Distributed Engine > Sites

Start-Process $installer -ArgumentList "/quiet /siteId=$siteId /ssUrl=$ssUrl" -Wait

After installation, navigate to Admin > Distributed Engine > Manage Sites in Secret Server and approve the new engine. Assign it to the appropriate site (e.g., "PROD-DMZ" or "OT-Network").

Enable the SSH and RDP proxy capabilities on the Distributed Engine site. This configures the DE to accept inbound protocol connections from authorized admin clients.

SS Admin Console โ€” Site Configuration
# In Secret Server UI:
# Admin โ†’ Configuration โ†’ SSH Proxy
SSH Proxy: ENABLED
SSH Proxy Port: 22 (or custom, e.g. 2222)
Block Unproxied SSH: TRUE # Force all SSH through proxy

# Admin โ†’ Configuration โ†’ RDP Proxy
RDP Proxy: ENABLED
RDP Proxy Port: 3389
Enable NLA: TRUE
Certificate: corp-wildcard.pfx

Every Secret associated with targets in the protected segment must be assigned to the site hosting the Distributed Engine. This ensures credential retrieval happens locally โ€” the vault secret never traverses the external network.

Secret Configuration (per target)
# On each Secret: Edit โ†’ Security tab
Site: PROD-DMZ # matches DE site
Proxy Enabled: TRUE
Session Recording: TRUE
Require Checkout: TRUE # one-person-at-a-time
Check-in Interval: 60 # minutes before auto-return

One of the key advantages: the DE requires zero inbound firewall rules. Only outbound HTTPS is required from the DE host.

Firewall Policy โ€” DE Host
# OUTBOUND from DE host (REQUIRED)
ALLOW TCP DE-HOST โ†’ vault.corp.local:443 # SS communication

# INBOUND to DE host (proxy connections from admins)
ALLOW TCP ADMIN-SUBNET โ†’ DE-HOST:22 # SSH proxy
ALLOW TCP ADMIN-SUBNET โ†’ DE-HOST:3389 # RDP proxy

# INBOUND from internet to target servers
DENY ALL 0.0.0.0/0 โ†’ TARGET-SUBNET:* # default deny

Session Recording & Auditability

Every traversal through the Delinea proxy generates a tamper-evident session record. This is the central pillar of privileged access auditability โ€” enabling forensic replay, compliance evidence, and real-time oversight.

Compliance Value: Session recordings satisfy audit evidence requirements under PCI DSS Req. 10.2, NIST SP 800-53 AU-2/AU-12, SOC 2 CC6.6, and ISO 27001 A.9.4 โ€” providing time-stamped, searchable records of every privileged command and action.

๐ŸŽฌ
Protocol-Level Capture

Recordings operate at the protocol layer (RDP graphics stream, SSH byte stream) โ€” not a screen recorder overlay. This means recordings are reliable, tamper-resistant, and unaffected by endpoint software.

โŒจ๏ธ
Keystroke Indexing

SSH sessions have all keystrokes extracted and indexed. Auditors can full-text search across session recordings โ€” e.g., find every session where sudo rm -rf was typed.

๐Ÿ‘
Live Session Monitoring

Privileged admins (security team) can view active sessions in real time. A single click terminates a suspicious session immediately, and the originating user receives an automatic notification.

๐Ÿšจ
Activity Pattern Alerts

Regex-based activity rules trigger alerts when sensitive commands appear โ€” e.g., any command matching DROP TABLE|passwd|/etc/shadow fires an immediate SIEM notification.

Configuring Recording Policies

Recording behavior is governed by Security Policy objects attached to Secrets. Multiple policies can coexist for different sensitivity tiers.

Secret Server โ€” Session Recording Policy
# Policy: PROD-CRITICAL-RECORD (applied to all prod server secrets)
Record Sessions: ENABLED
Record Keystrokes: ENABLED # SSH only
On-Screen Keyboard Masking: ENABLED # PCI requirement
Allow Viewing Live Sessions: ENABLED
Allow Terminating Sessions: ENABLED
Inactivity Timeout: 900 # seconds (15 min)
Recording Storage: SS-Database # or S3/Azure Blob
Retention Days: 365 # match compliance requirement
Activity Monitoring Rules: ENABLED
Alert Pattern 1: "rm\s+-rf|DROP TABLE|shutdown"
Alert Pattern 2: "/etc/shadow|/etc/passwd"
Alert Action: EMAIL + SIEM-SYSLOG

Recording Storage Architecture

Session recordings can be stored in the Secret Server database or offloaded to cloud blob storage for cost-effective long-term retention.

// FIGURE 3 โ€” SESSION DATA FLOW & STORAGE
๐Ÿ”ท DE PROXY captures stream indexes keystrokes ๐Ÿ” SECRET SERVER metadata + policy audit log writer live viewer relay ๐Ÿ—„๏ธ SQL DATABASE short-term / searchable โ˜๏ธ BLOB STORAGE S3 / Azure / GCS ๐Ÿšจ SIEM / ALERTS stream + index alerts
Retention Guidance: PCI DSS requires audit logs for at least 12 months (3 months immediately available). HIPAA recommends 6 years. Configure blob storage tiering to move recordings older than 90 days to cold storage automatically to minimize cost while meeting retention mandates.

Traditional vs. Delinea Proxy

A direct, dimension-by-dimension comparison between the classical jump server model and Delinea's Distributed Engine proxy architecture across security posture, operational efficiency, and compliance coverage.

Dimension โš ๏ธ Traditional Jump Server โœ… Delinea Proxy (DE)
Credential Exposure โœ— Admin receives and types credentials; exposed in memory and potentially in shell history โœ“ Credentials injected at protocol layer; admin endpoint never holds or sees the secret
Session Recording โœ— Requires 3rd-party overlay tools (Citrix, jump-server screen recorder); inconsistent coverage โœ“ Native protocol-level recording on every proxied session; no agent required on target
Lateral Movement Risk โœ— Compromised jump server = keys to the kingdom. Single failure point with large blast radius โœ“ DE has no stored credentials; compromise yields no usable secrets. Rotation invalidates any captured tokens
Firewall Complexity โœ— Inbound rules required on jump server, plus rules from jump to every target; sprawl grows with fleet โœ“ Only outbound port 443 from DE to Secret Server; inbound proxy ports from admin subnet only
Credential Rotation โœ— Manual; often deferred. Long-lived credentials are common after access events โœ“ Automated post-session rotation via Remote Password Changer; configurable per-secret policy
MFA Enforcement โœ— Requires separate MFA solution bolted onto the jump server; inconsistent across protocols โœ“ MFA enforced at Secret Server workflow layer โ€” applies uniformly before any session launch
Privileged User Experience โœ— Two-hop latency; admin must manage jump server login separately from target login โœ“ Single-click launcher from web UI or desktop agent; transparent credential injection
Access Request Workflow โœ— Typically out-of-band (email, ticket) with no automated enforcement or just-in-time capability โœ“ Native workflow with approval chains, time-limited access, and just-in-time provisioning
Compliance Coverage โœ— Partial; separate tools needed for logging, recording, and reporting; gaps require compensating controls โœ“ Unified audit trail: session recordings, keystroke logs, access requests, approvals โ€” all in one platform
Scalability โœ— Jump server becomes a bottleneck; high availability requires complex clustering โœ“ Multiple DEs per site; load balanced automatically. Add engines without reconfiguring firewall rules
Zero-Trust Alignment โœ— Once on the jump server, implicit trust is often extended to the entire target segment โœ“ Per-secret, per-session authorization; no persistent access; continuous verification through policy
โš ๏ธ Traditional Jump Server
โœ—Admin holds live credentials in memory
โœ—Shell history may persist credentials
โœ—Recording requires 3rd-party overlay
โœ—Two-hop authentication friction
โœ—Manual credential rotation (often skipped)
โœ—Single point of failure = full segment access
โœ—Inbound firewall rules grow unbounded
โœ—Out-of-band access approval processes
โœ… Delinea Distributed Engine
โœ“Zero credential exposure to admin endpoint
โœ“Protocol-level credential injection
โœ“Native session recording on every session
โœ“Single-click launch with transparent auth
โœ“Automated post-session credential rotation
โœ“No credentials stored in DE; minimal blast radius
โœ“Outbound-only HTTPS from DE (no inbound rules)
โœ“Built-in approval workflows with JIT access

Security Posture Improvement

Delinea's proxy model addresses the three most critical weaknesses of traditional jump-box deployments.

Traditional Risk: An attacker who compromises an admin's endpoint can capture credentials from memory (Mimikatz-style), from PuTTY session config, or from bash history files on the jump server. With those credentials, they pivot freely across the entire target segment.

Delinea Mitigation: Since credentials are injected at the protocol layer by the DE, the admin's workstation never holds the plaintext credential. Mimikatz on the admin endpoint yields nothing useful for the target systems. The DE itself holds no credentials between sessions โ€” it fetches them from the vault at session initiation and discards them after injection.

Traditional Risk: The jump server accumulates SSH keys, cached credentials, and network routes to every target. Compromise of this one node provides an attacker with everything needed to traverse the entire protected segment.

Delinea Mitigation: The Distributed Engine is a protocol proxy, not a credential store. A compromised DE node gives an attacker access only to active sessions in progress โ€” not to stored secrets. When credentials are rotated post-session, any token captured during a DE compromise is immediately invalidated. Combined with Secret Server's vault (a separate hardened system), the DE is architecturally less valuable as an attack target.

Traditional Risk: In a traditional model, admins can bypass recording by connecting to target systems directly (if firewall rules are permissive) or by switching to a protocol not covered by the screen recorder. Keystroke indexing is typically unavailable, making forensic investigations slow and incomplete.

Delinea Mitigation: With the firewall configured to block all direct access to the target segment (except from the DE IP), every session must traverse the proxy โ€” and every proxied session is recorded by policy. There is no off-path. Keystroke indexing enables rapid forensic search, and the complete session replay provides irrefutable evidence for compliance audits and incident response.

Knowledge Check

Test your understanding of the jump-box architecture module. Select the best answer for each question.

1. What is the primary security purpose of a jump box in a high-security network?
2. In Delinea's architecture, what does the Distributed Engine do with credentials when establishing an SSH session to a target?
3. Which outbound port does the Delinea Distributed Engine require to communicate with Secret Server?
4. What is a key advantage of Delinea's protocol-level session recording over traditional screen-recorder overlays?
5. After a proxied session ends, what does Secret Server's Remote Password Changer do?
6. Compared to a traditional jump server, what is the blast radius of a compromised Distributed Engine node?
7. Which compliance frameworks specifically benefit from Delinea session recording as audit evidence?
8. When an activity monitoring rule detects a suspicious command pattern during a session, what actions can Secret Server automatically take?
โ€”
Module Score