Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure

Due to its simplicity and popularity, SSH keys are a popular attack vector for the unauthorized access of server infrastructure, even with the wide availability of key management tooling. In 2014, a Ponemon Institute survey of more than 2,100 systems administrators at Global 2000 companies discovered that three out of four enterprises are vulnerable to root-level attacks against their systems because of their failure to secure SSH keys. These concerns led to the National Institute of Standards and Technology (“NIST”) to publish a 37 page guide on the best practices for securing server access management using SSH. More recently, the increased adoption of elastic, cloud…
Loading...

Download the PDF to learn:

Challenges of Modern Privileged Access Management

Security Best Practices Included in Teleport

Additional Benefits

Clients

Trusted by leading organizations

  • Airtable
  • Auth0
  • BigCommerce
  • DoorDash
  • Elastic
  • Samsung Electronics
  • SumoLogic
  • Swisscom
  • Threat Stack, Inc
  • Twitch