Non-disruptive SSH Risk Assessment service
We use unique scanning technology that does not affect ongoing SSH-enabled access, such as critical machine connections in financial and industrial environments. The outcome is a comprehensive prioritized report that identifies PAM bypass and helps you mitigate SSH Key risk, gain compliance and pass your IT audit.
SSH Risk Assessment is available before committing to any UKM purchase. The main goal is to determine what security risks and vulnerabilities exist due to SSH Keys in your IT environment and how you can meet your specific compliance requirements.
Reveal PAM bypass and take all connections under management
Our SSH Risk Assessment service is able to analyze your estate, and identify and flag SSH Keys that have been used for logins and those that have originated outside of policy-mandated PAM solutions. Our advanced software can also identify connections using other authentications, such as passwords, that originate beyond your PAM software.
Transitive trust analysis mitigates lateral movement
Our non-disruptive discovery technology reports on possible pivot points that malicious actors can use to exploit to access user data. Many well-known data breaches, involving both internal or external actors, involve unmanaged SSH Keys that enable lateral movement between servers that goes undetected by security systems.
Segregation of duties data protection requirements
Analyze and identify SSH Keys that enable connections outside an approved perimeter. For example, you can identify all keys that provide access to your production environment and potentially allow unauthorized access to sensitive databases, like healthcare, credit card or customer data.
SSH Risk Assessment projects include comprehensive documentation
- An audit of your SSH Key Environment, i.e. determining what you have now.
- An inventory of all active (or potentially active) SSH Keys in your environment.
- An IT Security Risk Assessment Report
- Recommendations to solve and/or remediate your uncovered situation.
- SSH Key Usage Analysis e.g. using data from syslog import.
- SSH Login Analysis e.g. login method & successful/failed access attempts.
- SSH Key Compliance Analysis e.g. against NIST, SOX, HIPAA, PCI-DSS, and/ or SANS CIS rules as desired.
- SSH Server Configuration Compliance Analysis e.g. against NIST, SOX, HIPAA, PCI-DSS, SANS CIS recommendations.
- SSH Key Environment Monitoring for a predetermined period.
- Monitoring determines what is actually occurring in your environment, so you can make an informed decision.
Learn how major corporations mitigate their SSH risks