AST Digital Magazine February 2017 AST Digital Magaiinse Volume 10 | Page 20

Volume 10
Shouldn ’ t we therefore take particular notice of credentials like SSH user keys , which are the only form of access that can be provisioned without oversight , don ’ t expire and aren ’ t linked to an identity ?
However , because the impact is so pervasive and all-encompassing across our networks , it is something that we are reluctant to take up to the C-suite and say , “ Folks , we somehow forgot about this one over the last 10 years .”
It ’ s unfortunate , and short-sighted , that journalists and security executives have often been reluctant to escalate the topic of SSH user keybased access .
The most common response is , “ Well , I need a smoking gun to act on this issue .”
But the smoking guns and evidence are overwhelming . Common sense and our common objective as security professionals to continuously decrease risk should guide us first on this one . If enterprises have no idea who SSH user keys belong to , how would they know if the keys were the privileged credential source that caused the
Feb 2017 Edition data breach ? If enterprises don ’ t have an inventory of them , are not monitoring them and don ’ t have a governance process regarding their provisioning , de-provisioning and recertification , how could they know ? They wouldn ’ t , and they couldn ’ t . This is why the biggest blind spot in our security postures today is SSH .
It grants access to our most critical systems and network infrastructure .
Our traditional layered security concepts are blind to what goes on inside the encrypted sessions . It is a gap inside the majority of identity governance administration programs today .
Creating Visibility Security today requires more than saying our PKI team controls SSH keys or that our Privileged Access Management team has the lead on this .
The fact is that they don ’ t really have it under control . This issue encompasses all aspects of identity governance today within our environment .

Industrial Strength Wireless Accessories for PoC Applications

Android and Apple Compatible
FREE SHIPPING ! Use code : FREESHIP
BTH-300
• 9 different versions !
• 10 + hours of talk time ( 50 hours standby )
• Built-in wireless PTT
• Built-in microphone ( for earphone-only applications ) with auto-switch technology
• Status LED , hidden so it does not attract attention
• Adjustable volume controls that remember settings , even when unit is turned off
• Micro USB charging jack compatible with 1000s of aftermarket battery chargers
• 360˚ metal , swivel , clothing clip allows user to wear comfortably
• SPP , BTLE , Android , and iOS
BASE
KIT-3 Acoustic Tube
KIT-1 Bud Earphone
KIT-2 Bullet Earphone
KIT-4 Swivel G-Hook
KIT-5 D-Ring Boom Mic
KIT-6 Thorat Mic
KIT-7 Helmet Kit
KIT-8 Earmuff Headset
Versions for other apps available .
20