When organizations don't properly manage their Secure Shell (SSH) keys, they can expose themselves to significant digital security risks. Those threats commonly arise from the fact that companies routinely use SSH for privileged access, but don’t seem to recognize the high-level access that they grant. This relative ignorance becomes even more dangerous when SSH keys are used for automating processes across routers, firewalls, and other mission-critical systems. Once cyber criminals gain access to this interwoven network of machines, they can pivot within your network until they locate valuable data.
How well does your machine identity protection strategy stack up? Find out.
The good news is that exposure to SSH risks isn't inevitable. Organizations can protect themselves by creating secure practices for managing their SSH keys.
Here are four best practices for SSH key management that every organization should follow.
- Build an SSH Inventory
You can't protect something about which you don't know. With that said, your organization should begin an SSH key management program by building an inventory of all SSH servers, private keys, and authorized keys that grant SSH access. You may be surprised by how many SSH keys you have. Many large organizations use more than one million SSH keys spread throughout their network. Your organization should ideally use an automated solution to make sure they discover SSH keys stored in user home directories as well as SSH configurations that limit access. You should then continue to actively manage this inventory as they add and/or decommission SSH-based assets.
- Identify Vulnerabilities in Your SSH Environment
The next step to strong SSH key management is scanning an inventory for known vulnerabilities and issues. Your organization should use tools to identify threats such as SSH root access, weak keys, back door keys, duplicated private keys, port forwarding, and insecure configurations. Those tools should also help automate the identification process so that companies can respond to issues and vulnerabilities as soon as they detect them.
- Remediate Known SSH Issues
Once you know there's an issue with your SSH environment, you should respond quickly by removing unauthorized keys, replacing old keys, and/or enforcing security controls that limit the accessibility and use of SSH keys. Ideally, your organization should automate these procedures and pair them with your identification tools. Doing so helps ensure consistent policy enforcement of SSH key lifecycle management. It also creates a trackable record of all changes to an organization's SSH assets.
- Monitor Your SSH Keys for Additional Risks
With the above processes in place, you should continuously manage and track your SSH keys. Specifically, your organization should make a point of conducting SSH audits for compliance violations, assessing risk, and increasing accountability for identity and access management.
Managing Your SSH Key Environment
Organizations can best manage their SSH key environment by gaining complete visibility over all their keys and certificates. This objective includes identifying all encryption assets and monitoring them for vulnerabilities, detecting anomalies, and enforcing policies.
Learn more about machine identity protection. Explore now.