![]() | ![]() |
Install or modify the services you want to provide.
Reconfigure the machine from a configuration suitable for development into its final running state.
If the bastion host is vulnerable to the Internet while it is being built, it may become an attack mechanism instead of a defense mechanism. An intruder who gets in before you've run the baseline audit will be difficult to detect and will be well positioned to read all of your traffic to and from the Internet. Cases have been reported where machines have been broken into within minutes of first being connected to the Internet; while rare, it can happen.
Take copious notes on every stage of building the system. Assume that sometime in the future, a compromise will occur that causes the machine to burst into flames and be destroyed. In order to rebuild your system, you will need to be able to follow all of the steps you took previously.
You will also need all of the software that you used, so you should be sure to securely store all of the things you need to do the installation, including:
The environment you used to build software from source, if it's different from the one you're installing; this includes the operating system, compiler, and header files (and a machine they run on)