...
Database in a Publically Accessible Subnet
The following list is our current availability for Pisaas instances, not where you’re deploying your Bastion host. if you’re unsure as to which region your Pisaas instance is deployed, please contact your CSM.
region | Panintelligence IP |
---|---|
EU-WEST-1 |
|
US-EAST-1 |
|
If your database is hosted in a publically accessible subnet, you can whitelist our PiSaas IPv4 address 54.216.240.181
. With AWS, this is adding this IP address to the inbound section on the NACLS and security groups. Working with Azure, add this IP address to the inbound firewall settings on the connection security tab on your database.
...
When connecting to your database from Panintelligence running in Pisaas, you should specify “localhost” as the host, along with your regular database connection details. Be sure the port you specify in Panintelligence is the same as that supplied to the Pisaas administration team.
Creating your Bastion host (AWS Centric)
Sign into your AWS account.
Create an EC2 instance (a micro instance is ok for this purpose)
Specify appropriate security groups or create a security group for the bastion host.
Create an inbound rule on your bastion security group that opens port 22 to the IP address given by Panintelligence.
Create an inbound rule on your bastion security group that opens port 22 to your IP address.
Create an outbound rule on your bastion security group that opens your database port (5432 for Postgres) to your database security group.
Create an inbound rule on your database security group that opens your database port (5432 for Postgres) from your new bastion security group.
log into your new Bastion host
create a new user
sudo useradd panintelligence
switch to your new user
sudo su - panintelligence
create the ~/.ssh directory if it does not exist
mkdir ~/.ssh
change the permissions of this new directory
chmod 700 ~/.ssh
create a file called authorized_keys in the ~/.ssh directory `touch ~/.ssh/authorized_keys
change the permissions of this new file
chmod 600 ~/.ssh/authorized_keys
edit the authorized_keys file and copy the contents of the panintelligence public key
additional steps
Consider hardening the OS, which refers to increasing the security that has been provided by the OS.