In my last blog, I covered several important security risks related to SSH. If not addressed, SSH risks can open your systems up to a breach/compromise. Surprisingly, despite these risks, most organizations I’ve worked with don’t have strong processes and controls in place to mitigate them. Many don’t even have a complete inventory of all their SSH servers and keys, nor do they have good processes in place to review and approve the granting of SSH access. You may find yourself in this unenviable situation. My goal in the next few posts of this blog series is to equip you with the best practices and techniques you can use to address these risks and ensure that SSH is a security asset in your organization instead of a liability.
As you saw in my last post, there are quite a few SSH risks. Now you’ll see that there are a similarly large number of best practices for securing your SSH environment, especially for enterprise environments. Consequently, I plan on starting at a high level in this post and then drilling down into specific best practices in future posts.
How strong is your machine identity posture? See what Forrester says.
Here is a high-level outline of the best practices that I suggest for mitigating SSH risks in enterprise environments:
After looking at the list, you might think, “Wow! That’s a lot of things to do. Where do I start?” It is a long list that can be daunting. However, keep in mind that if SSH is compromised, the breach your organization experiences could be significant. Protecting your SSH requires a certain level of commitment at several levels in your organization. Many of our customers, because of typical resource and time constraints they face, find they need to prioritize SSH best practices they’ll tackle first for their environments. The first step they take is to establish a best practices roadmap. One approach that I’ve found valuable in creating a SSH security roadmap is mapping SSH risks and best practices, so you can understand which best practices address each SSH risk.
In the following mapping table, the checkmarks indicate that a best practice (on the left) addresses a risk (across the top):
As you can see from the table, there are several best practices that address more than one risk and can take you a long way toward rapidly improving your SSH security posture. For example, you can minimize virtually all SSH risks by making sure that your system administrators and business units clearly understand what must be done to secure SSH by defining and communicating clear SSH policies. I’ll discuss policies in more detail in my next post. Similarly, establishing an inventory of SSH servers, keys, and configuration gives you significant leverage in securing SSH by providing you the visibility needed to identify, prioritize, and address vulnerabilities. Requiring regular reviews of SSH entitlements (access) also addresses four critical SSH risks.
My experience is that every organization has different priorities and environmental factors. The goal of this mapping approach is to help you establish a roadmap for implementing SSH best practices that will best meet your organization’s needs. To this end, Venafi provides an Excel version of this table to customers for their planning. If you’re interested, you can get a copy of the spreadsheet here. That way you can add things, move items around, highlight specific priorities, etc.
You’ll notice that I include “Other?” at the bottom of the table. If there is one thing I’ve learned during my time in information security, it is that there is always something new to learn. I’m sure there is a best practice I’ve overlooked. I’m interested in your feedback on things you do in your organization that are included in this list.
I hope you find this mapping approach helpful in establishing a best practices roadmap for securing SSH in your organization. In future posts, I’ll dig into individual best practices to provide a more in-depth view into specific actions you can take to improve your SSH security.