No More Backdoors: Know Who Has Access to What, Right Now
Jun 13
Register Today
Teleport logoTry For Free
Background image

Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure

Due to its simplicity and popularity, SSH keys are a popular attack vector for the unauthorized access of server infrastructure, even with the wide availability of key management tooling. In 2014, a Ponemon Institute survey of more than 2,100 systems administrators at Global 2000 companies discovered that three out of four enterprises are vulnerable to root-level attacks against their systems because of their failure to secure SSH keys. These concerns led to the National Institute of Standards and Technology (“NIST”) to publish a 37 page guide on the best practices for securing server access management using SSH. More recently, the increased adoption of elastic, cloud…

Book cover for "Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure"

Download the PDF to learn:

  • Challenges of Modern Privileged Access Management
  • Security Best Practices Included in Teleport
  • Additional Benefits


Trusted by leading organizations

  • Airtable logo
  • BigCommerce logo
  • DoorDash logo
  • Elastic logo
  • ExtraHop logo
  • SumoLogic logo
  • Swisscom logo
  • Threat Stack, Inc logo