The security of your entire network is only as good as your least secure server. And, relegating the Unix/Linux infrastructure to a status of any lesser degree is the attack surface that hackers are looking to exploit.
SSH key management
The crux of public / private key credentials is that the server has the public key and the client brings the private key to demonstrate that it is the legitimate privileged identity.
The reality of today’s cyber security landscape is that attackers can breach your network regardless of your countermeasures. Fortunately, with adaptive privilege management you can remediate security threats faster than cyber attackers can exploit them.
….we’ve been offering SSH key management in our products for months now. What differentiates our approach from other SSH Key Management vendors is that we understand the management of SSH keys in the context of privilege management.
Perimeter security is essential, and there’s always value in a having a detect and respond process in place. However, without significant investments in interior security (including privileged identity management, privileged access management, and secure file storage) to mitigate the inevitable intrusion, the best detect and respond systems have little value.