Secure Shell Protocol (SSH) is the most common Linux identity management tool and it is an indispensable part of every sysadmin’s toolbox. While many people use it, very few are aware of the possible security threats that insecure implementations can introduce in an environment.
In this whitepaper, we will help you protect your Ubuntu estate by:
- Providing a brief technical overview of the SSH protocol and main authentication methods
- Describing the most popular attack vectors
- Explaining strategic and practical ways to secure SSH access to cloud and on premise hosts
A practical guide to linux identity management
While this whitepaper will reference some specific Ubuntu technologies, the key concepts and recommendations apply to every Linux OS. You can start applying these principles by downloading Ubuntu Server or by running an instance on any of the major clouds, from Azure and Google Cloud Platform to AWS.
If you want to learn more about the topic, you can refer to our technical documentation.