SlideShare a Scribd company logo
1 of 38
//
// SSH: Your Lowest Cost,
Highest Risk Security Tool
Securing SSH Keys in Today’s Enterprise
© 2019 Venafi. All Rights Reserved.
1
Michael Thelander
Director Product & Strategy, Venafi
michael.thelander@venafi.com
//// © 2019 Venafi. All Rights Reserved.2
What Is SSH?1
How SSH Is Used2
SSH-Related Risks3
Security Best Practices For SSH (and a Path Toward Sanity)4
In This Session
//
// Recent News
© 2019 Venafi. All Rights Reserved.3
“Breach Shaming”
noun
Using recent breaches and exploits to ridicule the
security posture, readiness, or intelligence of
breach victims.
“The session lacked substance, and focused on
breach shaming"
//
//
• 500 million records
compromised
• Exploit began in 2014
• PII, dates of stays, locations
• 5 million passport records
Recent News
© 2019 Venafi. All Rights Reserved.4
“Another point brought up by Marriott … despite
having encrypted customer payment card data it
cannot assure those affected that the criminals
did not take the keys and access the
information.”
//
5
Machine Identity Protection
//
//
© 2019 Venafi. All Rights Reserved.6
Machines
Machine Identities
People
Usernames & Passwords
Identity
Two Actors on a Network
//
//
© 2019 Venafi. All Rights Reserved.7
Machines
Machine Identities
People
Usernames & Passwords
Two Actors on a Network
User Names & Passwords Machine Identities
$8 Billion
spent annually to protect Just beginning…
//
//
© 2019 Venafi. All Rights Reserved.8
Machines
Machine Identities
People
Usernames & Passwords
Two Actors on a Network
User Names & Passwords Machine Identities
//
//
© 2019 Venafi. All Rights Reserved.9
Machines
Machine Identities
People
Usernames & Passwords
Identities Are the Target
User Names & Passwords Machine Identities
//
//
Slide Content
© 2019 Venafi. All Rights Reserved.10
Devices
Futures:
Algorithms &
Blockchain
ServicesCode
What Are “Machines”?
//
//
© 2019 Venafi. All Rights Reserved.11
SSH Keys
SSL/TLS
Certificates
Code-signing
Certificates
Mobile & IoT
Certificates
Digital Keys and Certificates = Machine Identities
What Establishes Machines Identities?
//
Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved.
0.0
10.0
20.0
30.0
40.0
50.0
2005 2010 2015 2020 2025
0.0
50.0
100.0
150.0
200.0
250.0
300.0
2005 2010 2015 2020 2025
PROJECTED GROWTH (IN BILLIONS)
PEOPLE
APPLICATIONS
MACHINES
DEVICES
Growth Factors
• Cloud
• Virtual Machines
• Containerization
• DevOps
• Mobile Devices
• Internet of Things
• Industrial IoT
• Data Access
• Privacy Laws
More Machines = More Automated Connections
People
Machines
The Network is Growing Exponentially
//
//
I’m an SSH administrator
I’m a frequent SSH user
I’m an occasional SSH user
I can spell SSH
© 2019 Venafi. All Rights Reserved. 13
1
2
3
4
A Quick Poll
What is your usage of SSH?
//
// What Is SSH?
• The Free Protocol That Replaced Telnet
© 2019 Venafi. All Rights Reserved. 14
• Secure Shell (SSH) is
a cryptographic protocol for
operating network services
securely over an unsecured
network
• Typical applications include
remote command-line login and
remote command execution,
but any network service can be
secured with SSH
//
// What Is SSH?
• It Is Now Nearly Ubiquitous
© 2019 Venafi. All Rights Reserved. 15
• The standard TCP port for SSH is
port 22
• SSH is generally used to access
Linux or Unix-like operating
systems, but it can also be used
on Windows
• Windows 10 uses OpenSSH as
its default SSH client
//
//
• Both systems authenticate
connections between clients
and servers
• Both encrypt sessions
• Both can leverage asymmetric
or symmetric cryptography
• Both use built-in mechanisms
to insure data integrity
(algorithms and hashing, etc.)
• SSL/TLS usually employs x509
certificates, the SSH protocol
creates digital keys
• SSH includes commands that
allow activities like remote login
and command execution
• SSH supports a host of other
protocols and features: secure
file transfer, secure copy, flow
control, multiplexing, terminal
management
16
Similarities with SSL/TLS
//
//
© 2019 Venafi. All Rights Reserved. 17
Systems Managed Using SSH
Over 28% of organizations
use SSH to manage
1000 or more systems
Enterprises with large
SSH environments are
3X more likely to use SSH in
automated processes
• SSH Usage is Surprisingly Widespread
Nobody owns it and it’s free | So it’s easy to overlook its importance
//
“We’re changing audit procedures
again. They’ve added the requirement
to account for SSH key access.”
“Ummmm…. We don’t track SSH
key access. But I think we have
about 500,000 key pairs in our
different estates.”
Jim, the CISO
Chris, the InfoSec Dir
“We need to know in 60 days.”
“Oh SSHit.”
Jim, the CISO
Chris, the InfoSec Dir
//
Jim, the CISO
Chris, the InfoSec Dir
“What did the survey say?”
“Did I say 500,00 key pairs?”
“We need a plan by quarter end on how
we’re going to go from 6 million to no
more than 2 million key pairs.”
“It turns out we have
about 6 million key pairs.”
Chuck, the COO
60 Days Later…
//
//
© 2019 Venafi. All Rights Reserved. 20
SSHTLS
Customers
Partners
Employees Admins with
Root Access
Application
Owners
System
Admins
SSH
(SCP or SFTP)
File Transfer &
Remote Script
Execution
Jupiter
Where is SSH Used?
For 59% of orgs most or all admins manage SSH for systems they control
2017 Study by Dimensional Research n = 411 IT and Security professionals with in-depth knowledge of SSH
//
//
© 2019 Venafi. All Rights Reserved. 21
How Does SSH Work?
sally’s
public key
Is the correct
public key for
server1?
This is what we call
“Key Sprawl”
//
//
© 2019 Venafi. All Rights Reserved. 22
Illustrating SSH Risk
Private key
compromise
Weak/
guessable keys
Unauthorized
SSH servers
SSH SW
vulnerabilities
Pivoting to
other systems
Root account
compromise
Terminated
employee access
Unauthorized
SSH access
Backdoor keys
Port
forwarding
Privilege
escalation
Man-in-the-middle attacks
Vulnerable SSH configuration
//
//
© 2019 Venafi. All Rights Reserved. 23
Illustrating SSH Risk
SSH Risks/Vulnerabilities
Root account compromise
Unauthorized SSH Access
Privilege escalation
Terminated employee access
Backdoor keys
Port forwarding thru firewalls
Pivoting to other systems
Man-in-the-Middle attacks
Unauthorized SSH servers
Vulnerable SSH configuration
SSH SW vulnerabilities
Private key compromise
Weak/guessable keys
Private key
compromise
Weak/
guessable keys
Unauthorized
SSH servers
SSH SW
vulnerabilities
Pivoting to
other
systems
Root account
compromise
Terminated
employee access
Unauthorize
d SSH access
Privilege
escalation
Man-in-the-middle attacks
Vulnerable SSH configuration
Backdoor keys
Port
forwarding
//
//
© 2019 Venafi. All Rights Reserved. 24
2017 SSH Risk Study
The Result?
Most organizations are
underprepared to protect
against SSH-based attacks
o Surveyed over 400
o IT and Security professionals
with in-depth knowledge of SSH
o From the U.S., U.K. and Germany
o Goal: Measure how well
organizations implement security
controls for SSH keys
• 2017 Study by Dimensional Research
<10%
have a complete and
accurate inventory
//
//
© 2019 Venafi. All Rights Reserved. 25
2017 Study by Dimensional Research
n = 411 IT and Security professionals
with in-depth knowledge of SSH
2017 SSH Risk Study
• After Employee Resignation / Termination
SSH keys do not expire
//
//
© 2019 Venafi. All Rights Reserved. 26
2017 Study by Dimensional Research
n = 411 IT and Security professionals
with in-depth knowledge of SSH
• No inventory
• No key rotation
• Weak keys
• Terminated employees
still have access
• Potential backdoor keys
• Pivoting opportunities
for attackers
The Typical State of SSH
//
//
© 2019 Venafi. All Rights Reserved. 27
What About PAM?
//
//
© 2019 Venafi. All Rights Reserved. 28
What About PAM?
PAM covers the interactive access of people
but doesn’t focus on machine access
There are privileged people
and there are privileged machines
And these are NOT THE SAME
How often do your PAM policies require entitlement reviews?
Almost half (47%)review entitlements annually—at most
//
// Visibility | Intelligence | Automation
Risk Assessment
Discovery and Inventory
RemediationContinuous Monitoring
Automation
Stop
Bleeding
Clean Up
Mess
Stop
bleeding
CleanUp
Mess
Stop the Bleeding Clean Up Mess
Decision Point
Stop
Bleeding
Clean Up
Mess
2. Intelligence
1. Visibility
3. Automation
//
© 2018 Venafi. All Rights Reserved.
//
1 Network
Discovery to
Find SSH
Servers
2
SSH Key
Discovery*
2
SSH Key
Discovery*
Centralized
Repository
3
Report &
Analyze
4Notify &
Alert
*Agent or Agentless Discovery
Visibility | Intelligence | Automation
//
© 2018 Venafi. All Rights Reserved.
//
1 Network
Discovery to
Find SSH
Servers
2
SSH Key
Discovery*
2
SSH Key
Discovery*
Centralized
Repository
3
Report &
Analyze
4
Notify &
Alert
*Agent or Agentless Discovery
Best Practices in Action
//
© 2018 Venafi. All Rights Reserved.
// Track Your SSH Vulnerabilities
• Potential backdoor keys
• Root Access Orphans
• User Access Orphans
• Root Access
• Duplicate Private Keys
• Weak Key Lengths
• Vulnerable Protocol Use (SSH1)
• Private Key Orphans
• Known Host Orphans
• Shared Server Accounts
• Non-compliant Commands
• Non-compliant Source
Restrictions
• Missing Options
• Stale (unused) Keys
• Non-compliant Algorithms
• Non-compliant Vendor Format
• More…
//
//
© 2019 Venafi. All Rights Reserved. 33
Remediation and Verification
Discovery &
Inventory
Visibility
& Compliance
Monitor
& Report
Remediate
& Manage
• Discovery
• Network
• Agentless
• Agent-based
• Delegation
• Hierarchical
Structure
• Dynamic Groups
& Placement
• Permissions
• Dashboard
• Policies
• Violation Status
Messages
• Filtering
• Authorized Users
Report
(to PAM System)
• Key Usage
Logging
• Notifications -
SMTP, SNMP,
Splunk, more…
• Dashboard
• Ad Hoc Reporting
• Entitlements
Report
• Rotate Keysets
• Remove Keys
(User, Authorized, etc.)
• Add New Keys
• Configure Access
Restrictions
• Enforce
Approved
Configuration
//
//
© 2019 Venafi. All Rights Reserved. 34
A Word About Butter
• “Low and slow”
methodology evades
detection
• Brute-forces SSH
credentials
• Leads to deployment of
Samba RAT
• Can join DDoS attacks
• Can download and run
a Monero cyrptominer
One way to address:
• Enforce SSH Key Policy
• Rotate SSH Keys
What’s Old is New Again
//
//
//
© 2019 Venafi. All Rights Reserved.35
A Word About DevOps
DevOps Can Feed SSH Key Sprawl
//
//
Align SSH practices with your governing policies
Establish your SSH security requirements
Start gaining visibility
Gain intelligence about keys and connections
Start a discussion about automation of SSH key rotation
Talk to your DevOps teams about their usage of SSH
5 Things To Do TOMORROW*
36
1
2
3
4
5
6
* And a bonus “6th thing”
© 2019 Venafi. All Rights Reserved.
//
//
© 2019 Venafi. All Rights Reserved. 37
Summary
SSH is a powerful (but potentially dangerous) tool
• SSH environment provides privileged access to most systems
• It should be centrally controlled
• Hygiene policies should be analogous to user identities
Without centralized SSH key management
• Risk of breach from multiple vectors
• Pivoting risks are exacerbated
• Risk of non-compliance with PCI-DSS, HIPAA, etc.
//
// SSH: Your Lowest Cost,
Highest Risk Security Tool
Securing SSH Keys in Today’s Enterprise
© 2019 Venafi. All Rights Reserved.
38
Michael Thelander | michael.thelander@venafi.com

More Related Content

What's hot

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
Shawn Croswell
 

What's hot (20)

Attack chaining for web exploitation
Attack chaining for web exploitationAttack chaining for web exploitation
Attack chaining for web exploitation
 
InfoSec Monthly News Recap: April 2017
InfoSec Monthly News Recap: April 2017InfoSec Monthly News Recap: April 2017
InfoSec Monthly News Recap: April 2017
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference ISACA and RSA CSX Presentation from the RSA 2015 Conference
ISACA and RSA CSX Presentation from the RSA 2015 Conference
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
 
Cyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ VikjavaCyber Attacks on Financial _ Vikjava
Cyber Attacks on Financial _ Vikjava
 
DeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AIDeepPhish: Simulating malicious AI
DeepPhish: Simulating malicious AI
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure! OWASP Day - OWASP Day - Lets secure!
OWASP Day - OWASP Day - Lets secure!
 
FIDO Specifications Overview
FIDO Specifications OverviewFIDO Specifications Overview
FIDO Specifications Overview
 
Securing Remote Access
Securing Remote AccessSecuring Remote Access
Securing Remote Access
 
Advanced Privileged Identity Management: Moving Beyond the Gateway Approach t...
Advanced Privileged Identity Management: Moving Beyond the Gateway Approach t...Advanced Privileged Identity Management: Moving Beyond the Gateway Approach t...
Advanced Privileged Identity Management: Moving Beyond the Gateway Approach t...
 
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
VOIP2DAY 2015: "WebRTC security concerns, a real problem?"
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
black hat deephish
black hat deephishblack hat deephish
black hat deephish
 
Block Armour Digital Vault
Block Armour Digital VaultBlock Armour Digital Vault
Block Armour Digital Vault
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
The good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breachThe good, the bad and the ugly of the target data breach
The good, the bad and the ugly of the target data breach
 

Similar to SSH Keys: Security Asset or Liability?

ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
Matt Ford
 

Similar to SSH Keys: Security Asset or Liability? (20)

Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
Ch07.ppt
Ch07.pptCh07.ppt
Ch07.ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted SubjectsHow to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
How to Make Your IoT Devices Secure, Act Autonomously & Trusted Subjects
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ..."Is your browser secure? Breaking cryptography in PKI based systems, opening ...
"Is your browser secure? Breaking cryptography in PKI based systems, opening ...
 
Authshield integration with mails
Authshield integration with mailsAuthshield integration with mails
Authshield integration with mails
 
Privileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA TechnologiesPrivileged accesss management for den csa user group CA Technologies
Privileged accesss management for den csa user group CA Technologies
 
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3 The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
The Myth of SSH Key Rotation Mythcracker Webcast Series Part 3
 
Mining attackers mind
Mining attackers mindMining attackers mind
Mining attackers mind
 
Cybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdfCybersecurity Interview Questions_Part1.pdf
Cybersecurity Interview Questions_Part1.pdf
 
ethical-hacking-guide
ethical-hacking-guideethical-hacking-guide
ethical-hacking-guide
 
Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?Kent King - PKI: Do You Know Your Exposure?
Kent King - PKI: Do You Know Your Exposure?
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
Big Data security: Facing the challenge by Carlos Gómez at Big Data Spain 2017
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?A Closer Look at Isolation: Hype or Next Gen Security?
A Closer Look at Isolation: Hype or Next Gen Security?
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

SSH Keys: Security Asset or Liability?

  • 1. // // SSH: Your Lowest Cost, Highest Risk Security Tool Securing SSH Keys in Today’s Enterprise © 2019 Venafi. All Rights Reserved. 1 Michael Thelander Director Product & Strategy, Venafi michael.thelander@venafi.com
  • 2. //// © 2019 Venafi. All Rights Reserved.2 What Is SSH?1 How SSH Is Used2 SSH-Related Risks3 Security Best Practices For SSH (and a Path Toward Sanity)4 In This Session
  • 3. // // Recent News © 2019 Venafi. All Rights Reserved.3 “Breach Shaming” noun Using recent breaches and exploits to ridicule the security posture, readiness, or intelligence of breach victims. “The session lacked substance, and focused on breach shaming"
  • 4. // // • 500 million records compromised • Exploit began in 2014 • PII, dates of stays, locations • 5 million passport records Recent News © 2019 Venafi. All Rights Reserved.4 “Another point brought up by Marriott … despite having encrypted customer payment card data it cannot assure those affected that the criminals did not take the keys and access the information.”
  • 6. // // © 2019 Venafi. All Rights Reserved.6 Machines Machine Identities People Usernames & Passwords Identity Two Actors on a Network
  • 7. // // © 2019 Venafi. All Rights Reserved.7 Machines Machine Identities People Usernames & Passwords Two Actors on a Network User Names & Passwords Machine Identities $8 Billion spent annually to protect Just beginning…
  • 8. // // © 2019 Venafi. All Rights Reserved.8 Machines Machine Identities People Usernames & Passwords Two Actors on a Network User Names & Passwords Machine Identities
  • 9. // // © 2019 Venafi. All Rights Reserved.9 Machines Machine Identities People Usernames & Passwords Identities Are the Target User Names & Passwords Machine Identities
  • 10. // // Slide Content © 2019 Venafi. All Rights Reserved.10 Devices Futures: Algorithms & Blockchain ServicesCode What Are “Machines”?
  • 11. // // © 2019 Venafi. All Rights Reserved.11 SSH Keys SSL/TLS Certificates Code-signing Certificates Mobile & IoT Certificates Digital Keys and Certificates = Machine Identities What Establishes Machines Identities?
  • 12. // Copyright © 2018 Information Systems Audit and Control Association, Inc. All rights reserved. 0.0 10.0 20.0 30.0 40.0 50.0 2005 2010 2015 2020 2025 0.0 50.0 100.0 150.0 200.0 250.0 300.0 2005 2010 2015 2020 2025 PROJECTED GROWTH (IN BILLIONS) PEOPLE APPLICATIONS MACHINES DEVICES Growth Factors • Cloud • Virtual Machines • Containerization • DevOps • Mobile Devices • Internet of Things • Industrial IoT • Data Access • Privacy Laws More Machines = More Automated Connections People Machines The Network is Growing Exponentially
  • 13. // // I’m an SSH administrator I’m a frequent SSH user I’m an occasional SSH user I can spell SSH © 2019 Venafi. All Rights Reserved. 13 1 2 3 4 A Quick Poll What is your usage of SSH?
  • 14. // // What Is SSH? • The Free Protocol That Replaced Telnet © 2019 Venafi. All Rights Reserved. 14 • Secure Shell (SSH) is a cryptographic protocol for operating network services securely over an unsecured network • Typical applications include remote command-line login and remote command execution, but any network service can be secured with SSH
  • 15. // // What Is SSH? • It Is Now Nearly Ubiquitous © 2019 Venafi. All Rights Reserved. 15 • The standard TCP port for SSH is port 22 • SSH is generally used to access Linux or Unix-like operating systems, but it can also be used on Windows • Windows 10 uses OpenSSH as its default SSH client
  • 16. // // • Both systems authenticate connections between clients and servers • Both encrypt sessions • Both can leverage asymmetric or symmetric cryptography • Both use built-in mechanisms to insure data integrity (algorithms and hashing, etc.) • SSL/TLS usually employs x509 certificates, the SSH protocol creates digital keys • SSH includes commands that allow activities like remote login and command execution • SSH supports a host of other protocols and features: secure file transfer, secure copy, flow control, multiplexing, terminal management 16 Similarities with SSL/TLS
  • 17. // // © 2019 Venafi. All Rights Reserved. 17 Systems Managed Using SSH Over 28% of organizations use SSH to manage 1000 or more systems Enterprises with large SSH environments are 3X more likely to use SSH in automated processes • SSH Usage is Surprisingly Widespread Nobody owns it and it’s free | So it’s easy to overlook its importance
  • 18. // “We’re changing audit procedures again. They’ve added the requirement to account for SSH key access.” “Ummmm…. We don’t track SSH key access. But I think we have about 500,000 key pairs in our different estates.” Jim, the CISO Chris, the InfoSec Dir “We need to know in 60 days.” “Oh SSHit.” Jim, the CISO Chris, the InfoSec Dir
  • 19. // Jim, the CISO Chris, the InfoSec Dir “What did the survey say?” “Did I say 500,00 key pairs?” “We need a plan by quarter end on how we’re going to go from 6 million to no more than 2 million key pairs.” “It turns out we have about 6 million key pairs.” Chuck, the COO 60 Days Later…
  • 20. // // © 2019 Venafi. All Rights Reserved. 20 SSHTLS Customers Partners Employees Admins with Root Access Application Owners System Admins SSH (SCP or SFTP) File Transfer & Remote Script Execution Jupiter Where is SSH Used? For 59% of orgs most or all admins manage SSH for systems they control 2017 Study by Dimensional Research n = 411 IT and Security professionals with in-depth knowledge of SSH
  • 21. // // © 2019 Venafi. All Rights Reserved. 21 How Does SSH Work? sally’s public key Is the correct public key for server1? This is what we call “Key Sprawl”
  • 22. // // © 2019 Venafi. All Rights Reserved. 22 Illustrating SSH Risk Private key compromise Weak/ guessable keys Unauthorized SSH servers SSH SW vulnerabilities Pivoting to other systems Root account compromise Terminated employee access Unauthorized SSH access Backdoor keys Port forwarding Privilege escalation Man-in-the-middle attacks Vulnerable SSH configuration
  • 23. // // © 2019 Venafi. All Rights Reserved. 23 Illustrating SSH Risk SSH Risks/Vulnerabilities Root account compromise Unauthorized SSH Access Privilege escalation Terminated employee access Backdoor keys Port forwarding thru firewalls Pivoting to other systems Man-in-the-Middle attacks Unauthorized SSH servers Vulnerable SSH configuration SSH SW vulnerabilities Private key compromise Weak/guessable keys Private key compromise Weak/ guessable keys Unauthorized SSH servers SSH SW vulnerabilities Pivoting to other systems Root account compromise Terminated employee access Unauthorize d SSH access Privilege escalation Man-in-the-middle attacks Vulnerable SSH configuration Backdoor keys Port forwarding
  • 24. // // © 2019 Venafi. All Rights Reserved. 24 2017 SSH Risk Study The Result? Most organizations are underprepared to protect against SSH-based attacks o Surveyed over 400 o IT and Security professionals with in-depth knowledge of SSH o From the U.S., U.K. and Germany o Goal: Measure how well organizations implement security controls for SSH keys • 2017 Study by Dimensional Research <10% have a complete and accurate inventory
  • 25. // // © 2019 Venafi. All Rights Reserved. 25 2017 Study by Dimensional Research n = 411 IT and Security professionals with in-depth knowledge of SSH 2017 SSH Risk Study • After Employee Resignation / Termination SSH keys do not expire
  • 26. // // © 2019 Venafi. All Rights Reserved. 26 2017 Study by Dimensional Research n = 411 IT and Security professionals with in-depth knowledge of SSH • No inventory • No key rotation • Weak keys • Terminated employees still have access • Potential backdoor keys • Pivoting opportunities for attackers The Typical State of SSH
  • 27. // // © 2019 Venafi. All Rights Reserved. 27 What About PAM?
  • 28. // // © 2019 Venafi. All Rights Reserved. 28 What About PAM? PAM covers the interactive access of people but doesn’t focus on machine access There are privileged people and there are privileged machines And these are NOT THE SAME How often do your PAM policies require entitlement reviews? Almost half (47%)review entitlements annually—at most
  • 29. // // Visibility | Intelligence | Automation Risk Assessment Discovery and Inventory RemediationContinuous Monitoring Automation Stop Bleeding Clean Up Mess Stop bleeding CleanUp Mess Stop the Bleeding Clean Up Mess Decision Point Stop Bleeding Clean Up Mess 2. Intelligence 1. Visibility 3. Automation
  • 30. // © 2018 Venafi. All Rights Reserved. // 1 Network Discovery to Find SSH Servers 2 SSH Key Discovery* 2 SSH Key Discovery* Centralized Repository 3 Report & Analyze 4Notify & Alert *Agent or Agentless Discovery Visibility | Intelligence | Automation
  • 31. // © 2018 Venafi. All Rights Reserved. // 1 Network Discovery to Find SSH Servers 2 SSH Key Discovery* 2 SSH Key Discovery* Centralized Repository 3 Report & Analyze 4 Notify & Alert *Agent or Agentless Discovery Best Practices in Action
  • 32. // © 2018 Venafi. All Rights Reserved. // Track Your SSH Vulnerabilities • Potential backdoor keys • Root Access Orphans • User Access Orphans • Root Access • Duplicate Private Keys • Weak Key Lengths • Vulnerable Protocol Use (SSH1) • Private Key Orphans • Known Host Orphans • Shared Server Accounts • Non-compliant Commands • Non-compliant Source Restrictions • Missing Options • Stale (unused) Keys • Non-compliant Algorithms • Non-compliant Vendor Format • More…
  • 33. // // © 2019 Venafi. All Rights Reserved. 33 Remediation and Verification Discovery & Inventory Visibility & Compliance Monitor & Report Remediate & Manage • Discovery • Network • Agentless • Agent-based • Delegation • Hierarchical Structure • Dynamic Groups & Placement • Permissions • Dashboard • Policies • Violation Status Messages • Filtering • Authorized Users Report (to PAM System) • Key Usage Logging • Notifications - SMTP, SNMP, Splunk, more… • Dashboard • Ad Hoc Reporting • Entitlements Report • Rotate Keysets • Remove Keys (User, Authorized, etc.) • Add New Keys • Configure Access Restrictions • Enforce Approved Configuration
  • 34. // // © 2019 Venafi. All Rights Reserved. 34 A Word About Butter • “Low and slow” methodology evades detection • Brute-forces SSH credentials • Leads to deployment of Samba RAT • Can join DDoS attacks • Can download and run a Monero cyrptominer One way to address: • Enforce SSH Key Policy • Rotate SSH Keys What’s Old is New Again //
  • 35. // // © 2019 Venafi. All Rights Reserved.35 A Word About DevOps DevOps Can Feed SSH Key Sprawl
  • 36. // // Align SSH practices with your governing policies Establish your SSH security requirements Start gaining visibility Gain intelligence about keys and connections Start a discussion about automation of SSH key rotation Talk to your DevOps teams about their usage of SSH 5 Things To Do TOMORROW* 36 1 2 3 4 5 6 * And a bonus “6th thing” © 2019 Venafi. All Rights Reserved.
  • 37. // // © 2019 Venafi. All Rights Reserved. 37 Summary SSH is a powerful (but potentially dangerous) tool • SSH environment provides privileged access to most systems • It should be centrally controlled • Hygiene policies should be analogous to user identities Without centralized SSH key management • Risk of breach from multiple vectors • Pivoting risks are exacerbated • Risk of non-compliance with PCI-DSS, HIPAA, etc.
  • 38. // // SSH: Your Lowest Cost, Highest Risk Security Tool Securing SSH Keys in Today’s Enterprise © 2019 Venafi. All Rights Reserved. 38 Michael Thelander | michael.thelander@venafi.com

Editor's Notes

  1. Machine identities are critical to security and availability, but tend to be under protected. To understand why, let’s look at the two kinds of actors on every network—people and machines. [Click] People rely on user names and passwords to identify themselves and to gain access to machines, applications and devices. But machines don’t. They use digital keys and certificates to authenticate and secure communication between machines. [Click] Transition: In any complete identity and access management program, it’s important to secure and protect the identities of both people and machines, but in most organizations, that’s not what’s happening.
  2. Machine identities are critical to security and availability, but tend to be under protected. To understand why, let’s look at the two kinds of actors on every network—people and machines. [Click] People rely on user names and passwords to identify themselves and to gain access to machines, applications and devices. But machines don’t. They use digital keys and certificates to authenticate and secure communication between machines. [Click] Transition: In any complete identity and access management program, it’s important to secure and protect the identities of both people and machines, but in most organizations, that’s not what’s happening.
  3. Machine identities are critical to security and availability, but tend to be under protected. To understand why, let’s look at the two kinds of actors on every network—people and machines. [Click] People rely on user names and passwords to identify themselves and to gain access to machines, applications and devices. But machines don’t. They use digital keys and certificates to authenticate and secure communication between machines. [Click] Transition: In any complete identity and access management program, it’s important to secure and protect the identities of both people and machines, but in most organizations, that’s not what’s happening.
  4. Machine identities are critical to security and availability, but tend to be under protected. To understand why, let’s look at the two kinds of actors on every network—people and machines. [Click] People rely on user names and passwords to identify themselves and to gain access to machines, applications and devices. But machines don’t. They use digital keys and certificates to authenticate and secure communication between machines. [Click] Transition: In any complete identity and access management program, it’s important to secure and protect the identities of both people and machines, but in most organizations, that’s not what’s happening.