Securing SSH with the CIS Critical Security Controls

by Barbara Filkins
Sept. 1, 2017 1 comment SANS Institute Apps & Hardening protocols

A SANS Analyst Program whitepaper by Barb Filkins. It discusses how the Critical Security Controls—coupled with good configuration management processes—can support the effort required to avoid the risks inherent to SSH.

Irina Alexandra Negrii 7 months, 1 week ago

Although Secure Shell (SSH) is the most broadly used security protocol for remotely managing Unix/Linux, routers, firewalls, and other systems, most organizations have limited or no formal SSH policies or management in place.