Because a jump host serves at an entry point to privileged resources it is
a highly sought target by adversaries. Therefore, it is important to have
an increased focus on security. However hardening the jump host itself it
not enough, a holistic approach is needed. In this blog, Jakob Mollerup,
provides solid advice for jump host administrators to ensure continuous
protection of their jump host system.