A cloud security team is implementing a layered security approach to protect a cloud-based application. To prevent attackers from accessing critical administrative resources, they deploy a bastion host. What is the PRIMARY security benefit of using a bastion host?