How do you currently secure RDP admin access to servers?

Posted by squishmike@reddit | sysadmin | View on Reddit | 74 comments

I'm currently trying to revamp our administrative / privileged access at my company. We're a hybrid Windows shop with half on-prem half cloud. For server access, there seems to be many different ways to skin the cat on this one so I'm looking to see what other folks are doing with regards to this. Mabye there's a new and better way that I'm not aware of.

This is all of course assuming the separation of a standard regular account, where admins are logging into servers etc. using a different privileged account.

Things I've seen / tried in the past:
- Use a tool like Crowdstrike Identity or similar to throw MFA in front of RDP sessions. Admins can RDP from anywhere given that they are identified via MFA/conditional access. Additional identification can be attached to the network traffic as well (identification based firewall rules).

- Use a broker system like Beyond Trust, Delinea or similar where RDP sessions are administrered and accessed through a cloud service and then the RDP traffic funnelled through specific broker servers. RDP traffic is restricted to only being from the few broker boxes. This is likely quite secure (as far as you can trust the provider) but proven to be very cumbersome for administrators. At least in implementations I've seen/been a part of.

- Use secured jump servers. You can only RDP to other servers from these central jump server hosts (either running RDS or similar VDI) which are behind conditional access / identity & MFA. RDP to all other servers is restricted at the network layer.

- Yubikeys or some other hardware based token instead of app-based MFA. I've personally tried this in the past and it was both cumbersome and non-universal. The login would sometimes work with Yubikeys, either with the cert loaded on the key or using the 'tap to enter your password' functionality. But for other odd things / admin portals, it would not support Yubikey/certificates. I like the idea but it's not universally compatible yet.

- Other forms of 'passwordless'...?

Personally I'm a fan of Crowdstrike's MFA Identity implementation because you can also use that for MFA'ing to a myriad of other important things on the internal network, granting east-west protection (e.g. VMWare console, or any web-based admin console that is AD auth based).

But I'm very aware there could be other options I'm simply not aware of that might be better, or offer more balance in terms of security vs. convenience.