Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure
Due to its simplicity and popularity, SSH keys are a popular attack vector for the unauthorized access of server infrastructure, even with the wide availability of key management tooling. In 2014, a Ponemon Institute survey of more than 2,100 systems administrators at Global 2000 companies discovered that three out of four enterprises are vulnerable to root-level attacks against their systems because of their failure to secure SSH keys. These concerns led to the National Institute of Standards and Technology (“NIST”) to publish a 37 page guide on the best practices for securing server access management using SSH. More recently, the increased adoption of elastic, cloud…
Download the PDF to learn:
- Challenges of Modern Privileged Access Management
- Security Best Practices Included in Teleport
- Additional Benefits
Clients
Trusted by leading organizations