Security Investigate

Significant Hidden Threats to Your Enterprise Security

Download now Free registration required

Executive Summary

Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry. Most organizations have no process for managing, removing, and changing access-granting keys. This white paper focuses on SSH user key remediation as a process which all organizations utilizing SSH should be aware of and consider implementing.

  • Format: PDF
  • Size: 476.54 KB