SSH Risk Assessment - Understand Your SSH Keys
SSH Risk Assessment is a security assessment service that delivers a detailed analysis of how SSH (Secure Shell) is deployed and used in your network and provides an estimate of your SSH key management problem. It is a health check for your SSH environment.
In a recent Forrester survey, over 65% of enterprises reported that SSH is critical or important to their business. It is used by systems administrators and for automated processes such as database updates, disaster recovery, software management, and cloud provisioning. However, lax management controls over SSH expose organizations to data breach risk and compliance violations.
CISOs and security staff have an obligation to identify and resolve significant risk and compliance exposures before they fail an important audit or, much worse, before they get hacked. Unfortunately, most organizations lack the tools, time, and expertise needed to do a thorough assessment.
SSH Risk Assessment is an assessment service that addresses this need to have more information around the use of SSH and SSH key related authentication within your organization. It leverages our in-depth technology expertise, our custom-developed scanning and reporting software and our wide-ranging experience with thousands of customers to provide a service that is fast, efficient, and effective. You get actionable information that is packaged for the C-Suite and backed up by the details and data your technical staff needs to plan for any needed remediations.
- Fast - Completed in 5 days and requires only a few hours of your staff time.
- Non-invasive - Our tools do not require software agents to be installed and do not make any changes on your hosts. No private keys are collected or moved.
- Comprehensive - You get an analysis of the most significant risks including compelling visualizations of trust relationships.
- Compliance - Tailored to the compliance mandates of your business - such as Sarbanes-Oxley, PCI DSS, NIST Cybersecurity Framework, HIPAA, NIST 800-53, BASEL III, or others.
- Prioritized - We tell you what to focus on first and why.
- Safe - No information or data leaves your control.
After the assessment, you may choose to use the Universal SSH Key Management or look at competing solutions for addressing SSH key management. You may also want to look at how to prevent SSH tunneling from providing access from the outside to the internal network, how to monitor and audit external SSH connections and record sessions for analytics and forensics.
Details: What You Get
|Key management||Review and analysis of policies and procedures for lifecycle management of public/private key pairs|
|Separation of duties||Scan and discovery of any SSH authorizations that cross dev and prod environments|
|Authorizations to root||Discovery of all keys authorized for root access|
|Transitive trust analysis||Analysis of which keys provide broadest access into the network|
|Key size report||Report and statistics on key sizes. Weak keys highlighted.|
|Key age report||Analysis and statistics on key age. Keys older than 2 years and older than 5 years highlighted.|
|Key protection analysis||Report on private keys stored in clear text and/or transmitted in clear text|
|Least privilege analysis||Review of service and root account access authorizations|
|Privilege escalation||Review of whether current SSH configurations and controls prevent unintended escalations of access|
|SSH software management||Report on SSH versions in use. Identifies any insecure versions that should be upgraded.|
|SSH tunneling||Analysis of whether SSH tunneling is enabled and why, and any indications of misuse.|
|Activity monitoring analysis||Review of logging practices to determine whether SSH use is properly tracked|
|User monitoring analysis||Review and analysis of capabilities in place to monitor the activities of privileged users and processes|
|Information protection||Analysis of current capabilities for detecting data loss through SSH and SSH subchannels|
|Compliance||Report on potential audit findings for selected compliance mandates (PCI DSS, Federal Cybersecurity Framework, NIST 800-53, MAS, BASEL II & III, and others)|
|Summary and recommendations||Highlight most risks and compliance issues, recommendations and alternatives for remediation|
|Onsite consultation||Our consultant will meet with you to review the findings and recommendations|