Session 3: Control Your SSH..IT
The “what” of SSH; what SSH services an account is allowed to use, and what they can do once granted access -- Adding privilege management as an incorporated control measure
Session 2: Oh SSH..IT, Now What?!
Control the who, where, how and when of SSH access - How to provide granular access control above and beyond recommendations.
Session 1: The SSH..IT Storm
SSH has received a lot of attention over the last few years, and a new set of NIST recommendations will shine an even brighter light on it. The protocol itself, nor the software, are considered the root of the SSH security problem. Poor practices in the management of the service are to blame.