Best Practices for remote host access in UW Public Cloud Providers

Best Practices for remote host access in UW Public Cloud Providers

We suggest using cloud native tools for virtual server access rather than use direct ssh or RDP access to VMs.

Using these tools will help keep you hosts more secure by limiting access to these commonly targeted services, and will also put access to your hosts under NetID with MFA providing an added layer of security.

Each provider provides a secure way to access virtual systems in the cloud.

AWS:

AWS Systems Manager has a solution called Session Manager.  

AWS Session Manager supports: 

Linux, MacOS and Windows hosts

Session and Activity logging

Access via the web console/portal of the provider

Documentation here:

https://docs.aws.amazon.com/systems-manager/latest/userguide/session-manager.html

Azure:

Azure Supports a solution called Azure Bastion.

Azure Bastion supports:

Linux and Windows hosts

Activity logging

Access via the web console/portal of the provider

Documentation here:

https://docs.microsoft.com/en-us/azure/bastion/

GCP:

Supports a solution called Identity Aware proxy.

Identity Aware Proxy supports:

Linux and Windows hosts

Activity logging

Access via the web console/portal of the provider

Documentation here:

https://cloud.google.com/iap

Remote host access documentation here:

https://cloud.google.com/iap/docs/using-tcp-forwarding



Keywords:
AWS Azure GCP ssh rdp remote access
Doc ID:
109060
Owned by:
Kelly R. in Public Cloud
Created:
2021-02-15
Updated:
2025-04-30
Sites:
Public Cloud