with Secret Server
Extend Secret Server privileged account and
access protection to your Unix systems
Compromise of Unix systems could be catastrophic!
· Ensure your local root accounts are discovered, protected, controlled, and managed.
· Control and manage SSH keys.
· Make sure powerful commands (such as Sudo / Su) are limited in use for least privilege access.
Unix Protection delivers a powerful combo of security tools:
SSH Key Management and Unix Command Whitelisting
Step up your security without impacting your business user’s daily work routine with:
|SSH Key Management||SSH Command Whitelisting|
|Automatically rotate SSH Keys in Secret Server and target systems||Allow SSH Keys to be checked-out when access is needed to a system||Maintain better control over the use of Sudo and Su commands on Unix systems||Combine with session recording to maintain audit trails of commands used|
|Maintain unique keys for each of your systems, to limit lateral threat movements||Generate new SSH Key pairs whenever needed, on demand or on schedule||Improve administrative delegation on Unix systems with Secret Server||Help facilitate a move to least privilege by only providing users with the commands they need|
Protect Private / Public Keypairs
Private keys must be protected at all cost. If compromised they give a malicious user complete and uncontrolled access to any system that has a stored corresponding public key. These keypairs are often left unchanged for months or even years (if ever changed at all). Unix Protection from Thycotic ensures you can generate, store, protect, and manage your SSH Keys directly within Secret Server.
Secure Unix systems under Least Privilege
Root accounts on a Unix-based system provide a lot of power to a single administrator. With SSH Command Whitelisting, you can create a list of allowed commands by each administrator, ensuring that even root accounts are limited.