Your browser does not allow storing cookies. We recommend enabling them.

Financial Institution Case Study


A global financial institution was facing internal security audit concerns with respect to their retail and IT environments. The risks identified serious shortcomings for their existing privileged access management (PAM) – due to the unmanaged state of SSH keys, as developers were able to self-provision their own SSH access and bypass the PAM solutions already put in place. As SSH keys never expire, self-provisioned accesses to production servers continually accumulated and proliferated over time and as a result the unmanaged SSH key-based accesses required immediate remediation.


SSH Communications Security partnered with the financial institution by offering them our SSH key management platform Universal SSH Key Manager®. The solution addressed the SSH key management issues with a purpose-built design that focused on workflows for SSH key management, as opposed to alternative solutions that are based on certificate management systems that are retrofitted for SSH keys.

Universal SSH Key Manager was able to successfully handle the entire SSH lifecycle management process at the Financial Institution – it was able to discover the trusted access relationships associated with all SSH keys, monitor the SSH key usage, remediate the access to conform to defined policies, and manage the SSH-based access centrally. Universal SSH Key Manager allowed the financial institution to regain control of trusted access in their critical infrastructure and address all of its outstanding audit concerns.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more