SSH is a de facto standard in securing communications through an encrypted link and elevating privileges, but what happens when SSH is itself not properly secured? What vulnerabilities are inherent in the protocol and how do organizations remediate them? Does the protection of the keys used by SSH affect the trust placed in this protocol? Despite the importance of SSH, organizations often neglect to pay attention to best practices related to configuration, especially in the area of adequate controls over SSH keys and key associations. One way to address this is through the Critical Security Controls.
Sign up for this webcast and be among the first to receive an advance copy of a SANS whitepaper discussing the vulnerabilities of SSH and how the Critical Security Controls provide a roadmap to remediating those flaws.
Please send questions about this webcast to email@example.com.
View the associated whitepaper here.