SSH user key and access management can create significant challenges. Organizations usually address them in one of several ways. They may treat SSH issues as an extension of a privileged access management project. They may use a cryptography team that is already managing certificates and other PKI-related issues, or they may treat the challenges as an aspect of their configuration management system processes.
NSA confirms system admin accounts as a preferred attack vector into corporate systems, highlighting the importance of proper privileged access management. Universal SSH Key Manager to the rescue! #privilegedaccess#keymanagement#infosec