Secure Shell (SSH) & SANS Center for Internet Security Critical Security Controls (CIS-CSC)
With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find.
The SANS CIS Critical Security Controls are a recommended set of actions for cyber defense that provide specific and actionable ways to stop today’s most pervasive and dangerous attacks. A principle benefit of the Controls is that they prioritize and focus a smaller number of actions with high yield results.
Large-scale ICT environments employ large volumes of servers, routers, switches, database and application servers, and other networked systems. These systems are maintained and administered with the SSH protocol and a software suite that provides secure administrative login, application tunneling, and secure file transfer. The SSH protocol is a standard component of every server and networked device.