NIST Guidelines for Secure Shell and What They Mean for Your Organization

December 17, 2019

The National Institute of Standards and Technology (NIST) has issued a set of recommended guidelines for the use of Secure Shell (SSH) in automated access management. These guidelines encourage organizations to proactively protect SSH keys and control SSH sessions to better secure the sensitive data accessed using SSH. Recommended control areas include: Account management, Access enforcement, Least privilege auditing and monitoring, Risk assessment, and Identification and authentication. This solution brief outlines the NIST guidelines for SSH and explains how CyberArk solutions can help organizations comply with these guidelines.

Previous Article
CyberArk Privileged Access Security Solution for Business-Critical Microsoft Applications
CyberArk Privileged Access Security Solution for Business-Critical Microsoft Applications

The CyberArk Privileged Access Security Solution helps customers and partners secure their business-critica...

Next Article
Securing and Managing Privileged Credentials Used by Commercial Off-the-Shelf (COTS) Applications
Securing and Managing Privileged Credentials Used by Commercial Off-the-Shelf (COTS) Applications

Application Access Manager and the broad range of partner integrations enables organizations to simplify ho...