NIST Guidelines for Secure Shell and What They Mean for Your Organization

December 17, 2019

The National Institute of Standards and Technology (NIST) has issued a set of recommended guidelines for the use of Secure Shell (SSH) in automated access management. These guidelines encourage organizations to proactively protect SSH keys and control SSH sessions to better secure the sensitive data accessed using SSH. Recommended control areas include: Account management, Access enforcement, Least privilege auditing and monitoring, Risk assessment, and Identification and authentication. This solution brief outlines the NIST guidelines for SSH and explains how CyberArk solutions can help organizations comply with these guidelines.

Previous Article
CyberArk for SAP Environments
CyberArk for SAP Environments

With more organizations leveraging numerous SAP systems, applications and databases to run their businesses...

Next Article
Securing Microsoft Enhanced Security Administrative Environments (ESAE) with CyberArk Privileged Access Security
Securing Microsoft Enhanced Security Administrative Environments (ESAE) with CyberArk Privileged Access Security

The ESAE is a secured, bastion forest architecture designed to manage the Active Directory and all the asso...