NIST Guidelines for Secure Shell and What They Mean for Your Organization

December 17, 2019

The National Institute of Standards and Technology (NIST) has issued a set of recommended guidelines for the use of Secure Shell (SSH) in automated access management. These guidelines encourage organizations to proactively protect SSH keys and control SSH sessions to better secure the sensitive data accessed using SSH. Recommended control areas include: Account management, Access enforcement, Least privilege auditing and monitoring, Risk assessment, and Identification and authentication. This solution brief outlines the NIST guidelines for SSH and explains how CyberArk solutions can help organizations comply with these guidelines.

Previous Article
Addressing Gaps in GDPR Compliance with CyberArk Privileged Access Security
Addressing Gaps in GDPR Compliance with CyberArk Privileged Access Security

Learn how CyberArk Privileged Access Security solutions can help you eliminate gaps, strengthen your securi...

Next Article
What Contractors Need to Know About the Department of Defense’s Insider Threat Program
What Contractors Need to Know About the Department of Defense’s Insider Threat Program

Government contractors are required to establish, implement, monitor, and report on the effectiveness of in...