Security Best Practices for Privileged Access Management of Cloud-Native Infrastructure

Due to its simplicity and popularity, SSH keys are a popular attack vector for the unauthorized access of server infrastructure, even with the wide availability of key management tooling. In 2014, a Ponemon Institute survey of more than 2,100 systems administrators at Global 2000 companies discovered that three out of four enterprises are vulnerable to root-level attacks against their systems because of their failure to secure SSH keys. These concerns led to the National Institute of Standards and Technology (“NIST”) to publish a 37 page guide on the best practices for securing server access management using SSH. More recently, the increased adoption of elastic, cloud…

Security Best Practices for PAM of Cloud-Native Infrastructure report cover

Download the PDF to learn:

Challenges of Modern Privileged Access Management

Security Best Practices Included in Teleport

Additional Benefits


Trusted by leading organizations