Securing SSH with the CIS Critical Security Controls

by Barbara Filkins Sept. 1, 2017 via SANS Institute

A SANS Analyst Program whitepaper by Barb Filkins. It discusses how the Critical Security Controls—coupled with good configuration management processes—can support the effort required to avoid the risks inherent to SSH.

https://www.sans.org/reading-room/whitepapers/analyst/securing-ssh-cis-critical-security-controls...

Avatar
Irina Alexandra Negrii 17 hours ago

Although Secure Shell (SSH) is the most broadly used security protocol for remotely managing Unix/Linux, routers, firewalls, and other systems, most organizations have limited or no formal SSH policies or management in place.

Reply