Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

SSH Communications Security Launches New Secure Shell Management Service

Finland-based SSH Communications Security announced today the launch of a new governance, risk and compliance (GRC) service designed to help organizations with Secure Shell (SSH) key management in data center environments.

Finland-based SSH Communications Security announced today the launch of a new governance, risk and compliance (GRC) service designed to help organizations with Secure Shell (SSH) key management in data center environments.

SSH is a cryptographic network protocol used for secure data communication and other network services. Organizations that don’t manage their SSH keys properly expose themselves to internal and external attacks, and they risk getting fines in case an audit finds that they are not compliant with mandatory security regulations and laws.

The new Secure Shell HealthCheck service launched by SSH Communications Security at the IT-SA Conference in Nuremberg, Germany, can be used to identify violations and other issues related to SSH management, configuration and access control.

“Too few companies are fully aware of the risks associated with lax Secure Shell key management. Secure Shell HealthCheck provides organizations with a complete view into their Secure Shell environments and a detailed assessment of security and compliance risks impacting their data centers,” said Christian Kress, general manager, DACH, SSH Communications Security. “When production servers are accessible with unknown keys and where access to those servers violates policy – a common scenario we encounter – the risks to the business are evident.”

Secure Shell HealthCheck provides a full analysis of the SSH environment, including SSH key locations, trust maps, and information on nearly a dozen other significant risk areas. The service also provides organizations with information on the actions they must take in order to remediate issues, reports for each category of stakeholders (CISOs, managers and engineers), and compliance analysis for regulatory frameworks such as PCI-DSS, Basel III, and NIST guidelines.

“At many enterprises there is a lack of awareness of the role Secure Shell plays in critical day-to-day operations. Secure Shell key-based authentications can easily outnumber many other logins within the data center,” commented Kalle Jääskeläinen, vice president of product management and services at SSH Communications Security. “While companies have implemented access controls and management procedures for employee login and external facing web applications, even basic security controls like key size, strength and type, rotation and de-provisioning are not part of the IT regimen for data center access controls. Our Secure Shell HealthCheck service provides the actionable information needed to improve security and access controls.”

Tatu Ylonen, the inventor of the SSH protocol and the CEO of SSH Communications Security, is one of the authors of a recently published NIST guide for addressing the security risks posed by the use of SSH for automated access.

 

Advertisement. Scroll to continue reading.
Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet