Date Published: January 2016
Author(s)
Murugiah Souppaya (NIST), Karen Scarfone (Scarfone Cybersecurity), Larry Feldman (G2)
This bulletin summarizes the information presented in NISTIR 7966, "Security of Interactive and Automated Access Management Using Secure Shell (SSH)." The publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
This bulletin summarizes the information presented in NISTIR 7966, "Security of Interactive and Automated Access Management Using Secure Shell (SSH)." The publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on...
See full abstract
This bulletin summarizes the information presented in NISTIR 7966, "Security of Interactive and Automated Access Management Using Secure Shell (SSH)." The publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys.
Hide full abstract
Keywords
access control; authentication; automated access management; device authentication; interactive access management; Secure Shell (SSH); user authentication
Control Families
Access Control;
Audit and Accountability;
Security Assessment and Authorization;
Contingency Planning;
Identification and Authentication;
Maintenance;
Personnel Security;
Planning;
Risk Assessment;
System and Communications Protection;
System and Information Integrity;