Published: Jul 12, 2021

Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure

by Teleport

Download the Full Tech Paper

In the days when servers were precious pets and applications were large monolithic code bases, securely accessing application environments for updates and maintenance was a fairly simple process of installing the public keys of authorized users on servers and using SSH. The use of key management or server configuration tooling could be used to automate the management of keys for larger or more dynamic teams.

Due to its simplicity and popularity, SSH keys are a popular attack vector for the unauthorized access of server infrastructure, even with the wide availability of key management tooling. In 2014, a Ponemon Institute survey of more than 2,100 systems administrators at Global 2000 companies discovered that

three out of four enterprises are vulnerable to root-level attacks against their systems because of their failure to secure SSH keys. These concerns led to the National Institute of Standards and Technology (“NIST”) to publish a 37 page guide on the best practices for securing server access management using SSH. More recently, the increased adoption of elastic, cloud…

Download Security Best Practices for Privileged Access Management

Share this page

Try Teleport today

In the cloud, self-hosted, or open source

View Developer Docs

This site uses cookies to improve service. By using this site, you agree to our use of cookies. More info.