![](http://image.absoluteastronomy.com/images//topicimages/noimage.gif)
Stepping stone (computer security)
Overview
Stepping stone
Stepping stone and similar can refer to:* Step-stone bridge, stones placed in a river to allow pedestrians to cross* Stepping stone , a type of computer security measure...
s used to cross a river. Using this system, it is possible to apply a granular control over each system acting as a 'stone', establishing different risk levels as so many systems which have been placed in the series.
For example, to grant a user with access to an OpenSSH
OpenSSH
OpenSSH is a set of computer programs providing encrypted communication sessions over a computer network using the SSH protocol...
server, for executing an application in a high-security environment, we could put a front-end system such as a Sun Solaris with a Citrix Metaframe in the 1st security layer.
Discussions