When thinking about privileged accounts – and the credentials used to access them – passwords typically come to mind. Yet passwords are only part of the equation. The Secure Shell (SSH) key, a low-profile, “Swiss Army Knife” of IT teams, is one of the most heavily used access control and encryption protocols in the enterprise, providing direct, root access to critical systems. Yet SSH keys often fly under the radar of security teams.
Read more at – SSH Keys: The Powerful, Unprotected Privileged Credentials