Unused or unmonitored SSH keys grant alarming levels of privileged access beyond users. Learn how securing your SSH inventory beyond your PAM solution helps compliance with NIST, FISMA, and CDM along with five steps you can take today to strengthen SSH security in this presentation. Learn the impacts of SSH security on compliance with the NIST 800-53, 800-171, F ISMA, CDM and other regulations. The biggest risks facing your inventory are the biggest risks and strategies for preventing the misuse of SSH keys.”]
Source: https://www.govinfosecurity.com/five-actions-that-will-immediately-improve-ssh-security-a-11503

