NIST Guidelines for Secure Shell and What They Mean for Your Organization

December 17, 2019

The National Institute of Standards and Technology (NIST) has issued a set of recommended guidelines for the use of Secure Shell (SSH) in automated access management. These guidelines encourage organizations to proactively protect SSH keys and control SSH sessions to better secure the sensitive data accessed using SSH. Recommended control areas include: Account management Access enforcement Least privilege Auditing and monitoring Risk assessment Identification and authentication This solution brief outlines the NIST guidelines for SSH and explains how CyberArk solutions can help organizations comply with these guidelines.

Previous Flipbook
Securing Microsoft Enhanced Security Administrative Environments (ESAE) with CyberArk Privileged Access Security
Securing Microsoft Enhanced Security Administrative Environments (ESAE) with CyberArk Privileged Access Security

The ESAE is a secured, bastion forest architecture designed to manage the Active Directory and all the asso...

Next Flipbook
What Contractors Need to Know About the Department of Defense’s Insider Threat Program
What Contractors Need to Know About the Department of Defense’s Insider Threat Program

Government contractors are required to establish, implement, monitor, and report on the effectiveness of in...