Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

ITL Bulletin January 2016

Securing Interactive and Automated Access Management Using Secure Shell (SSH)

Date Published: January 2016

Author(s)

Murugiah Souppaya (NIST), Karen Scarfone (Scarfone Cybersecurity), Larry Feldman (G2)

Abstract

Keywords

access control; authentication; automated access management; device authentication; interactive access management; Secure Shell (SSH); user authentication
Control Families

Access Control; Audit and Accountability; Security Assessment and Authorization; Contingency Planning; Identification and Authentication; Maintenance; Personnel Security; Planning; Risk Assessment; System and Communications Protection; System and Information Integrity;