Product & Solution Briefs

Beyond SSH Privileged Access Management (PAM) with Aporeto – Solution Brief

In any organization with multiple users and multiple servers the number of ssh keys floating around can be several multiple times greater than the number of employees. User generated identity keys are rarely, if ever, rotated, can become lost, deleted, shared, and never expire resulting in SSH key sprawl. Obfuscation of a user’s true identity is even more problematic when hosts, and their adjacent systems, are accessed using accounts and keys which do not correlate with an authenticated identity; audit logs to meet compliance requirements become difficult if not impossible to correlated.