SSH Keys: The Powerful, Unprotected Privileged Credentials

SSH-InfographicPost

CyberArk-SSH-Keys-Infographic-1014When thinking about privileged accounts – and the credentials used to access them – passwords typically come to mind. Yet passwords are only part of the equation. The Secure Shell (SSH) key, a low-profile, “Swiss Army Knife” of IT teams, is one of the most heavily used access control and encryption protocols in the enterprise, providing direct, root access to critical systems. Yet SSH keys often fly under the radar of security teams. As a result, these powerful credentials are left unsecured and unmanaged, leaving gaping holes in security and providing attackers with easy, direct access to the heart of the enterprise.

Research by Ponemon Institute shows that three out of four enterprises have no security controls in place for SSH keys and that 51 percent of enterprises have already experienced an SSH key-related compromise. Sobering statistics, though not surprising, as SSH keys are often created without any oversight or management, and an average enterprise can have one million SSH keys in their environment. It’s time to start treating SSH keys like the privileged credentials they truly are.

Today, CyberArk unveiled comprehensive SSH key management as part of our Privileged Account Security Solution. Companies can now secure and manage SSH keys as well as other privileged credentials in a single, integrated platform to identify, manage and protect against advanced external attackers and malicious insiders.

Learn more about how CyberArk can help protect your organization’s SSH keys at www.CyberArk.com/SSH.