Governance & Risk Management , Identity Governance & Administration
How to Protect SSH Keys
Mike Dodson of Venafi Outlines Four StepsSSH keys are widely used to provide privileged administrative access, but they’re often untracked, unmanaged and unmonitored, says Mike Dodson of Venafi, who outlines an approach for better key protection.
See Also: Visibility Into Distributed Cloud Environments
”SSH is ubiquitous, and for most organizations, it’s not something they purchase,” Dodson says. “Typically, there’s no central owner, so the takeaway message is recognize that SSH is a critical part of your security infrastructure and it needs to be managed with purpose and in a centralized way.”
In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Cramer discusses:
- Defining SSH keys’ role in security;
- Why some organizations struggle to manage SSH keys;
- The four steps organizations should take for securing SSH keys.
Dodson is vice president, ww security strategy and solutions, at Venafi. He has 25 years of experience working to bring better security and privacy to enterprise software, consumer products, embedded systems, medical devices and mobile computing.