SSH Security Vulnerability Report - IT's Dirty Little Secret

13
SECRET IT dirty little ‘s information technology Research brought to you by:

description

Global organizations are under attack, and the attackers are more dangerous and persistent than ever. While the motivations vary, the goal of today’s cybercriminal is to become and remain trusted on targeted networks in order to gain full access to sensitive, regulated and valuable data and intellectual property, and circumvent existing controls. SSH keys offer them critical security vulnerabilities for root-level access.

Transcript of SSH Security Vulnerability Report - IT's Dirty Little Secret

Page 1: SSH Security Vulnerability Report - IT's Dirty Little Secret

SECRETIT dirty little‘s

inform

ation

tech

nology

Research brought to you by:

Page 2: SSH Security Vulnerability Report - IT's Dirty Little Secret

IT admins are leaving open backdoors–full root access–to

almost every server, virtual machine, and cloud service

within the enterprise.

Page 3: SSH Security Vulnerability Report - IT's Dirty Little Secret

SSH (Secure Shell) is a cryptographic security protocol used to connect administrators and machines. It is used everyday, in every enterprise network.

SSH provides full administrator access over encrypted sessionsthat bypasses network monitoring, perimeter based security solutions, and advanced threat protection systems. SSH keys are not being properly secured and provide unfettered admin access to valuable and sensitive data and valuable intellectual property.

SSH ??

Page 4: SSH Security Vulnerability Report - IT's Dirty Little Secret

A single SSH-key related security incidentcan cost U.S. organizations as much as

500,000$

Page 5: SSH Security Vulnerability Report - IT's Dirty Little Secret

PaymentSystems

HealthcareDatabases

Air TrafficControl Systems

Cloud infrastructure-as-a-service systems

SSHis used to connectto systems such as:

Page 6: SSH Security Vulnerability Report - IT's Dirty Little Secret

EXP. NEVER!

EXP. 1 YEAR

IT administrators, not IT security, are responsible for securing and protecting their SSH keys.

Unlike digital certificates, SSH keys never expire, leaving backdoors open forever!

have no security controls for SSH that provides would-be hackers unfettered, root access.

3 OUT OF 4 ENTERPRISES

Page 7: SSH Security Vulnerability Report - IT's Dirty Little Secret

Of organizations are leaving a permanent backdoor open.Never changing SSH keys allows ex-staff and previous attackers to gain access.

46%

Either never change their SSH keys or change them, at best, once every 12 months.

The average IT user changes their password every

60-90 days

***************

YET

82%

Page 8: SSH Security Vulnerability Report - IT's Dirty Little Secret

(at least the ones that know)

OF ORGANIZATIONS REPORT BREACHES DUETO FAILED SSH SECURITY IN THE LAST 24 MONTHS

ALL OF THIS HAS ALREADY LED TO

51%

Page 9: SSH Security Vulnerability Report - IT's Dirty Little Secret

2 daysthe average enterprise

takes almostto respond to a SSH compromise if it’s detected

THE LACK OF IT SECURITY CAPABILITIES MEANS

60% OF RESPONDENTS REPORTED THAT THEIR ORGANIZATIONS CANNOT DETECT NEW SSH KEYS INTRODUCED ONTO THEIR NETWORKS;

relying on administrators to report and track themmanually and without oversight.

Page 10: SSH Security Vulnerability Report - IT's Dirty Little Secret

Only 13% of organizations think IT security should be responsible, continuing the insanity - root administrator access is wide open while IT security is scrambling to stop cybercriminal attacks.

It’s no wonder,

76% of enterprisesreport no systems to secure SSH when using the cloud

Page 11: SSH Security Vulnerability Report - IT's Dirty Little Secret

IT security can’t tolerate this insanity any more. Root level access and SSH will kill everything

else that IT security has worked to build.

Page 12: SSH Security Vulnerability Report - IT's Dirty Little Secret

CEOs, CIOs, CISOs are tolerating insanityallowing IT admins to run their SSH security

and expecting to stay secure.

Page 13: SSH Security Vulnerability Report - IT's Dirty Little Secret

For more information visit: www.venafi.com/Ponemon