SSH Risk Assessment as a service or self-service
SSH Risk Assessment Service
The goal is to determine what security risks and vulnerabilities exist due to SSH keys in your IT environment and how you can meet your specific compliance requirements.
After scanning your environment, our experts analyze the results and provide you with a detailed custom report that:
- Discovers SSH keys in your network.
- Identifies privileged access management (PAM) bypass.
- Identifies vulnerable SSH keys that are in violation of policies and regulations.
- Collects relevant information to help you gain SSH compliance and pass your IT audits.
- Provides custom recommendations.
SSHerlock: Discovery
& Audit Self-service
SSHerlock is an SSH key and post-quantum resilience discovery and audit self-service tool.
With SSHerlock you can scan your entire SSH key estate or just a few selected servers - anytime, for free.
The SSHerlock self-service helps you:
- Gain visibility into your SSH key estate within minutes.
- Discover policy and compliance violations.
- Identify violations of SSH connections crossing production/non-production boundaries.
- Prepare for IT audits by providing recommendations for remediation of violations.
Compare SSH Risk Assessment Service and SSHerlock Self-service
Feature | SSHerlock Discovery & Audit Self-service | SSH Risk Assessment Service |
---|---|---|
Discovery and analysis of SSH user keys |
●
|
●
|
Discovery and analysis of SSH host keys |
●
|
●
|
Discovery of SSH1 keys |
●
|
●
|
SSH key trust relationship map |
●
|
●
|
Reporting on SSH key algorithms, size and age |
●
|
●
|
Reporting on orphan keys |
●
|
●
|
Reporting on the usage of weak cryptographic algorithms |
●
|
●
|
SSH server hardening (reporting on common security pitfalls: SSHv1, password authentication for root accounts, TCP tunneling, agent and X11 forwarding, etc.) |
●
|
●
|
Reporting on the usage of deprecated ciphers, MACs and KEX algorithms |
●
|
●
|
Access from non-production to production |
●
|
●
|
Reporting on SSH key parameters |
●
|
●
|
SSH key policy recommendations |
●
|
●
|
SSH key security recommendations |
●
|
●
|
PAM/jump host bypass | - |
●
|
Reporting on unused SSH key granting access | - |
●
|
Analysis of keys under root and other high-privilege, high-risk user accounts | - |
●
|
Reporting on keys granting access to forbidden locations | - |
●
|
Reporting on transitive trusts including privilege elevation through pivoting | - |
●
|
SSH Risk Assessment custom report includes:
- An audit of your SSH key environment, i. e. a comprehensive overview of your current situation (servers, authorizations, keys, policies)
- An inventory of all active (or potentially active) SSH keys in your environment
- SSH key health analysis, e. g. key algorithms, length, and age
- SSH key compliance analysis, e.g. against NIST, SOX, HIPAA, PCI-DSS, and SANS CIS rules
- Root accounts analysis, e. g. privileged account violations
- Non-production to production analysis, e. g. non-prod to prod authorizations, non-prod to prod access violations
- Recommendations to solve and/or remediate your uncovered situation
Learn how major corporations mitigate their SSH risks >
SSHerlock Discovery & Audit report includes:
- A basic audit of your SSH key environment, i. e. a simple overview of your current situation (servers, authorizations, keys, policies)
- SSH key health analysis, e.g. key algorithms, length, and age
- SSH key compliance analysis, e.g. against NIST, SOX, HIPAA, PCI-DSS, and SANS CIS rules
- Root accounts analysis, e. g. privileged account violations
- Non-production to production analysis, e. g. non-prod to prod authorizations, non-prod to prod access violations
- Recommendations to solve and/or remediate your uncovered situation
Talk to our experts about our non-invasive SSH Risk Assessment service for complex SSH environments
Thanks for submitting the form.