Poorly managed SSH keys pose serious risks for most companies
Three in four have no processes for managing keys that provide access to 
critical servers
By Jaikumar Vijayan (Computerworld (US)) 22nd February, 
2014http://www.arnnet.com.au/article/538884/poorly_managed_ssh_keys_pose_serious_risks_most_companies/?fp=2&fpid=1

Many companies are dangerously exposed to threats like the recently revealed 
Mask Advanced Persistent Threat because they don't properly manage the Secure 
Shell (SSH) cryptographic keys used to authenticate access to critical internal 
systems and services.
A Ponemon Institute survey of more than 2,100 systems administrators at Global 
2000 companies discovered that three out of four enterprises are vulnerable to 
root-level attacks against their systems because of their failure to secure SSH 
keys.
Even though more than half of the surveyed enterprises had suffered SSH-key 
related compromises, 53% said they still had no centralized control over the 
keys and 60% said they had no way to detect new keys introduced in the 
organizations. About 46% said they never change or rotate SSH keys -- even 
though the keys never expire.
Those findings reveal a significant gap in enterprise security controls, said 
Larry Ponemon, founder and CEO of the Ponemon Institute. "It's hard to believe 
that companies allow themselves to be so insecure," he said. "This doesn't 
appear to be a situation where this vulnerability has to even be a 
vulnerability."
SSH keys allow administrators to remotely login to and operate a system via a 
secure encrypted tunnel. Administrators use such keys to authenticate access to 
critical database systems, application servers, cloud systems and security 
systems. SSH keys are also used to authenticate machines running automated 
processes and services and to protect data in transit.
SSH keys never expire, meaning that once a key is used to authenticate access 
to a system, the same key can be used in perpetuity unless it is changed. A 
hacker who acquires an unsecured SSH key can use it to gain access to the 
server or service to which it is attached and then use that access to try and 
find more keys for jumping on to other systems in a network.
Because SSH keys provide administrator-level, fully encrypted access to 
enterprise systems, any compromise of the keys could allow an attacker to gain 
complete control of a system while they remain hidden from view.
SSH uses an encryption key pair to enable a secure connection between two 
systems. One key is for the server and the other for the client device that 
wants access to the server. An organization might have numerous SSH keys with 
access to a single server.
Large enterprises can have tens of thousands of SSH keys on their network -- 
most of which are poorly managed, said Kevin Bocek, vice president of product 
marketing and threat research at security vendor Venafi, which commissioned the 
Ponemon survey.
Companies often have little knowledge about the presence of such keys on their 
networks and therefore do little to manage them.
"SSH is really critical as a root-level access [tool]," Bocek said. "It is an 
encrypted channel that goes around traditional host protections."
By stealing SSH keys, attackers like those behind The Mask APT can impersonate 
admins, snoop around and take complete control of a target's network without 
being detected, he said. There are signs that National Security Agency 
contractor Edward Snowden might have used SSH keys or a similar digital 
certificate to access and steal documents without being detected, he said.
Systems administrators typically introduce SSH keys into an environment with 
little awareness of how the keys can be misused, Bocek said. Though IT security 
teams at some organizations have attempted to gain control over key management, 
many enterprises still leave the task to the administrators, he said.
In the Ponemon survey, about 74% of the respondents said they allow 
administrators to independently control and manage SSH keys. As a result, 
enterprise security teams often have very little visibility into the scale of 
the problem and even less information about how to manage it.
To get a handle on the problem, enterprises must figure out where SSH is in use 
and how many keys might be floating about on their networks. They then need to 
find a way to correlate the keys back to the appropriate servers, evaluate 
whether they're needed and put in place a process for automatically changing 
keys.

Jaikumar Vijayan covers data security and privacy issues, financial services 
security and e-voting for Computerworld. Follow Jaikumar on Twitter at 
@jaivijayan or subscribe to Jaikumar's RSS feed. His e-mail address is 
[email protected].
                                          
_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to