Information Security 15 min read

Securing Operations with JD Cloud’s Bastion Host: Design, Challenges & Deployment

This article reviews JD Cloud’s bastion host solution presented at the 2020 Global New‑Generation Software Engineering Summit, detailing the security challenges of modern operations, compliance requirements, design principles, cloud‑native architecture, and real‑world deployments in enterprises and finance.

Efficient Ops
Efficient Ops
Efficient Ops
Securing Operations with JD Cloud’s Bastion Host: Design, Challenges & Deployment

Overview

At the 2020 Global New‑Generation Software Engineering Online Summit, JD Cloud product architect Ren Longtao shared the topic “Efficient and Secure Operations Design and Practice of Bastion Host.” This article revisits that presentation, analyzing the security problems in operations and JD Cloud’s practical solutions.

Why Bastion Hosts Matter

A programmer once deleted his company’s database, causing a loss of nearly 24 billion yuan, illustrating severe gaps in operation‑permission control such as single‑person deletion without secondary confirmation. Common challenges include unverifiable user identities, shared system accounts, difficult audit trails, and uncontrolled access.

Chinese regulations—Cybersecurity Law, “Multi‑Level Protection” 2.0, industry‑specific rules—demand log retention, identity authentication, minimal‑privilege authorization, full audit, regular backups, and compliance with telecom, financial, and corporate governance standards.

Bastion Host Core Functions

The bastion host provides two main capabilities: operation management and audit. It offers unified identity authentication, asset management, access authorization, and end‑to‑end operation audit.

Applicable Scenarios

The solution fits internet, finance, government, and virtually any organization requiring secure operations, especially for remote work during the COVID‑19 pandemic where VPN + bastion host becomes the optimal choice.

Evolution of Bastion Hosts

Initially hardware‑based, bastion hosts were rigid and hard to upgrade. In 2000, software bastion hosts emerged, solving hardware limitations, but the cloud era introduced new challenges:

Multi‑cloud environments with dispersed assets require unified management and audit.

Asset management must adapt to dynamic VPCs, subnets, and hybrid clouds.

High‑availability and disaster‑recovery architectures are essential for continuous service.

Horizontal scalability is needed to handle rapidly growing asset inventories.

Design Principles

JD Cloud follows the principle: “The bastion host we need is the bastion host we build.” Requirements include:

Support for major public‑cloud providers and private‑cloud frameworks.

Robust security guarantees as a core element.

Exceptional user experience—operations should feel seamless.

One‑click deployment enabling minute‑level provisioning of assets, users, and accounts.

Cloud‑Native Layered Architecture

The system adopts a low‑coupling, layered, distributed design:

Storage layer: cloud disks, etcd, Elasticsearch, OSS.

Data‑control layer: Kubernetes API server.

Core layer: JD Cloud‑developed API service “Bastion” handling authentication, asset, and user management.

Access layer: custom SSH relay, web terminal (Web Terminal), and browser‑based UI.

Each layer is independently deployable and horizontally scalable. JD Cloud packages all modules into a single container image for containerized deployment, with options for multi‑instance high‑availability clusters across regions.

Four‑A Security Model

The bastion host implements the “4A” principles:

Unified Identity Authentication : role‑based access, multi‑factor (SMS, Google Auth, LDAP, AD), batch user import via IAM or files.

Unified Asset Management : centralized account handling, password/key rotation, SSO, batch asset import, grouping, automatic credential updates.

Unified Access Authorization : precise logging of who accessed which machine, when, from where, and what actions were performed.

Permission Management : IP restrictions, time windows, command whitelists, secondary approvals, preventing privilege abuse.

Full‑Lifecycle Audit

Comprehensive audit includes video recording, command‑level logging, and searchable command archives. Recordings are downloadable, backup‑able, and playable; command logs support full‑text search for rapid incident investigation.

Internal Deployment at JD Cloud

JD Cloud uses a service‑tree‑based machine authentication scheme, simplifying role‑based permissions and isolating bastion from other systems. Unified entry points synchronize user, decision, and asset data, with end‑to‑end recording that meets the 4A standards.

Infrastructure Backbone

JD Cloud leverages the second‑generation Intel® Xeon® Scalable platform, delivering strong performance, simplified cloud infrastructure, and support for data platforms, AI acceleration, and automated management, enabling elastic scaling, reliability, and cost efficiency.

Banking Industry Adoption

JD Cloud offers both public‑cloud and private‑cloud bastion solutions. A Hong Kong bank deployed a distributed bastion architecture across on‑premise IDC and multiple clouds, achieving unified management, authorization, and zero‑plugin access via standard browsers.

The bank benefits from continuous software updates, rapid patch delivery, and OEM support, ensuring system stability and security.

Beyond Operations: Risk Control and AI

Leveraging JD’s big‑data and AI capabilities, JD Cloud provides end‑to‑end risk‑control solutions for consumer finance, banking, and credit services, covering the full lifecycle of retail loan risk management.

cloud-nativeHigh AvailabilityIdentity Managementauditoperations securityBastion Host
Efficient Ops
Written by

Efficient Ops

This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.