Find out more
Date Added: Oct 2013
Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry. Most organizations have no process for managing, removing, and changing access-granting keys. This white paper focuses on SSH user key remediation as a process which all organizations utilizing SSH should be aware of and consider implementing.