A no-compromise cloud service for zero trust access

Our cryptographic multi-root zero-trust protocol allows us to offer a cloud service for remote access, without needing privileged access to your targets. So you can simplify your life without having to compromise on security.

Got 6 minutes?

Learn how our security model works.

Multiple roots of trust

BastionZero splits control of your targets between two independent roots of trust: your Identity Provider (IdP) and our cloud service. No one can access your infrastructure without the consent of both roots of trust. That means you can outsource remote access to our SaaS, without worrying that our SaaS will create a point of compromise for your infrastructure.

Centralized policy management

You can write fine-grained policies that control access to your targets via a single web console or API endpoint. BastionZero makes it easy to control exactly which user can assume which role/account on which target, across all your different clouds and environments. BastionZero does this by leveraging the industry-standard Open Policy Agent (OPA).

Centralized logging

BastionZero’s cloud service logs who accessed which role/account on a target, along with what they did to the target. We support your forensics and compliance requirements by providing searchable command logs along with session recordings. And we even log what your users are doing inside kubectl exec.

Zero trust in the cloud

For Linux

BastionZero integrates directly into your SSH workflows without VPNs, SSH keys or open SSH ports.

For Kubernetes

BastionZero integrates with your k8s workflows, adds SSO, MFA + policy control, and logs your kubectl commands and exec.

For Webservers

With BastionZero, your users can access internal applications that are invisible to the public internet, without requiring a VPN.

For Databases

BastionZero integrates with your DB workflows, allowing fine-grained visibility and control into who is looking at and touching your sensitive data.

Zero trust access via SSO + MFA

BastionZero automatically integrates with your existing IdP, so you can easily control users’ access to your targets in any cloud or on-prem environment via SSO. An additional independent MFA to BastionZero’s cloud service ensures that your targets are secure even if your IdP or user SSO is compromised.

No more key management, open ports, VPNS, or proxies

BastionZero is a cloud service, so you can operate it without maintaining jumphosts or proxies. Each target phones home to the cloud service via a secure TLS websocket. That way, BastionZero can discover targets that are invisible to the public Internet. The target is locked down (even without a VPN) because it does not accept incoming connections.

Target autodiscovery

Configuring long-lived keys and credentials for short-lived targets or infrastructure as code can be tricky to manage and secure. But with BastionZero, no keys are required. Instead, your targets are autodiscovered by BastionZero as they spin up and down.  To be discovered, targets just need to present our cloud-service with a short-lived one-time activation code when they phone home.

See it for yourself.

Sign up for a demo.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Resources