Security News > 2017 > November > Half of organizations do not audit SSH entitlements
Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted by Dimensional Research. According to Venafi’s research from October, even though SSH keys provide the highest levels of administrative access they are routinely untracked, unmanaged and poorly secured. Auditing SSH entitlements as part of Privileged Access Management (PAM) policies can help organizations understand how well they control access to sensitive … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/ix8KIXMmYvk/