I've set up a jump box in Azure on a separate subnet, which can only access my application VM. The subnet for the application VM only allows incoming traffic from the jump box, and I've added a Network Security Group (NSG) to whitelist my public static IP for SSH access. It's a Linux-based jump box, and I'm looking for additional hardening steps I should consider to enhance its security.
2 Answers
Have you thought about using Azure Bastion? It's a secure way to access your VMs without exposing them to the internet. It could offer better security than a custom jump box for SSH access.
While Azure Bastion is a good option, sticking with your custom setup is great too! Just make sure you regularly update your Linux system, change SSH port to something non-standard, and consider using key-based authentication instead of passwords. Also, implementing fail2ban can help protect against brute-force attacks.

Related Questions
Can't Load PhpMyadmin On After Server Update
Redirect www to non-www in Apache Conf
How To Check If Your SSL Cert Is SHA 1
Windows TrackPad Gestures