SSH is nearly ubiquitous in today’s enterprises, and is the predominant tool for managing Linux servers and the applications and data that they host. Poor practices around the deployment and management of the SSH infrastructure has been blamed or associated with various breaches, and has gained considerable attention from management and administrators. A number of reports over that last two years have exposed the vulnerabilities in SSH; not in the protocol or software itself, but in the poor practices deploying, managing and maintaining control over it.
SSH must be managed properly, in a way that accounts for its various methods of authentication, and in a way that accounts for its various features. But, even properly managing SSH alone does not actually ‘secure’ an SSH deployment. SSH relies on accounts, and they must be accounted for in a security plan, along with what people are allowed to do once they connect.
In this presentation, we will discuss the numerous pitfalls and common mistakes related to SSH deployment; as well as best practices in properly deploying SSH across your diverse server environment.
Survey this Session