Unix protection

Compare

Description

Unix Protection
with Secret Server

Extend Secret Server privileged account and
access protection to your Unix systems

Compromise of Unix systems could be catastrophic!

·         Ensure your local root accounts are discovered, protected, controlled, and managed.

·         Control and manage SSH keys.

·         Make sure powerful commands (such as Sudo / Su) are limited in use for least privilege access.

Unix Protection delivers a powerful combo of security tools:
SSH Key Management and Unix Command Whitelisting

Step up your security without impacting your business user’s daily work routine with:

Unix Protection

SSH Key Management SSH Command Whitelisting
Automatically rotate SSH Keys in Secret Server and target systems Allow SSH Keys to be checked-out when access is needed to a system Maintain better control over the use of Sudo and Su commands on Unix systems Combine with session recording to maintain audit trails of commands used
Maintain unique keys for each of your systems, to limit lateral threat movements Generate new SSH Key pairs whenever needed, on demand or on schedule Improve administrative delegation on Unix systems with Secret Server Help facilitate a move to least privilege by only providing users with the commands they need

 

Protect Private / Public Keypairs

Private keys must be protected at all cost. If compromised they give a malicious user complete and uncontrolled access to any system that has a stored corresponding public key. These keypairs are often left unchanged for months or even years (if ever changed at all). Unix Protection from Thycotic ensures you can generate, store, protect, and manage your SSH Keys directly within Secret Server.

Secure Unix systems under Least Privilege

Root accounts on a Unix-based system provide a lot of power to a single administrator. With SSH Command Whitelisting, you can create a list of allowed commands by each administrator, ensuring that even root accounts are limited.

 

Reviews

There are no reviews yet.

Be the first to review “Unix protection”

Alamat email Anda tidak akan dipublikasikan. Ruas yang wajib ditandai *