Thanks for the "Where Are My SSH Keys?" webcast!
Attendees learned how securing your SSH inventory beyond your PAM solution can assist in compliance with NIST, FISMA, and CDM.
It's surprising how easily your SSH keys can become valuable and fall into the wrong hands. Regardless of being innocent or malicious, your SSH keys could be misused to gain privileged access to your critical systems and data.
During the webcast, attendees learned:
- The impacts of SSH security on compliance with NIST 800-53, 800-171, FISMA, and CDM
- The biggest risks facing your SSH inventory
- Strategies for preventing the misuse of SSH keys
- Five actions that will immediately improve SSH security
Have any questions about this event or Venafi? Feel free to contact me.
Jenna Tabatabaian
703-889-9726
|