SSH Key Discovery: A Guide for Auditors and Compliance Professionals
See how SSH's key discovery tool can facilitate risk, audit & compliance processes and discover access control related security issues in secure shell environments.
Identity and access management is a central part of any organization’s network security architecture. While the security industry has done a good job with controlling non-administrator & interactive users (ie. user name and password controls), administrator access and application-to-application authentication methods have flown far below the radar.
In this webinar, we will provide a comprehensive guide to security auditors and compliance professionals to learn how to discover potential vulnerabilities in secure shell environments in relation to current and emerging compliance trends including SOX, PCI, Monetary Authority of Singapore (MAS), NIST and FISMA.