How to Protect SSH KeysMike Dodson of Venafi Outlines Four Steps
SSH keys are widely used to provide privileged administrative access, but they’re often untracked, unmanaged and unmonitored, says Mike Dodson of Venafi, who outlines an approach for better key protection.
”SSH is ubiquitous, and for most organizations, it’s not something they purchase,” Dodson says. “Typically, there’s no central owner, so the takeaway message is recognize that SSH is a critical part of your security infrastructure and it needs to be managed with purpose and in a centralized way.”
In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Cramer discusses:
- Defining SSH keys’ role in security;
- Why some organizations struggle to manage SSH keys;
- The four steps organizations should take for securing SSH keys.
Dodson is vice president, ww security strategy and solutions, at Venafi. He has 25 years of experience working to bring better security and privacy to enterprise software, consumer products, embedded systems, medical devices and mobile computing.