Sloppy management of authentication keys for SSH, an encryption protocol used for automation in IT systems, risks catastrophic IT failure in banks, government and industry. Most organisations have no process for managing, removing, and changing access-granting keys. This violates SOX, FISMA, PCI, and HIPAA, all which require proper control of access to servers and proper termination of access.
A cyber weapon or virus using SSH keys to spread could destroy IT infrastructure and online data of an enterprise or government agency within minutes. Similar attacks were first used by the Morris worm, which took down the Internet in 1988.
This webinar focuses on SSH user key remediation as a process and will outline a basic process and set of tools which can be utilized to identify the existing trust relationships in your environment, bring legacy keys under control, and automate the creation, deployment, rotation and removal of keys.
This webinar will:
Look at the consequences of poorly managed SSH keys and risky insiders
Consider how ands why IT security auditors are overlooking this problem
Educate the audience about SSH key audits and remediation
Advise how to save costs and increase performance with correctly managed SSH keys.
Outline a process and set of tools which can be utilized to identify existing trust relationships