COBIT Framework for Risk & Governance, for the IT Security & IT Risk Professional

What is the COBIT 5 Framework?

XXX

XXX link to ISACA and authoritative rules

Process Requirements in COBIT 5

XXX

XXX Introduce identity & access management and role of SSH keys in it

Technical Requirements in COBIT 5

XXX

XXX mention SSH key management, segregation of duties, auditing SSH&remote access connections, 3rd party access somehow

Other Related Security Standards

XXX

NIST Guidelines for SSH Key Management

XXX

How to Achieve COBIT Compliance?

XXX