{"id":565,"date":"2024-09-26T21:23:36","date_gmt":"2024-09-27T03:23:36","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=565"},"modified":"2024-10-04T14:13:23","modified_gmt":"2024-10-04T20:13:23","slug":"a-passwordless-and-keyless-future-using-secure-priveleged-access-management","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/09\/26\/a-passwordless-and-keyless-future-using-secure-priveleged-access-management\/","title":{"rendered":"A Passwordless AND Keyless Future"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">What is Privileged Access Management (PAM)?<\/h4>\n\n\n\n<p>Privileged Access Management (PAM) is a package of cybersecurity strategies and access management tools utilized for controlling, monitoring, and safeguarding users with privileged access permissions.[3] A PAM system ensures your computers have a secured network that is able to decrease operational complexity and protects important resources such as data, user accounts, networks, devices, systems, and processes.[3] PAM manages shared accounts, super users, teams, and service accounts.[3]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How does PAM work?<\/h4>\n\n\n\n<p>In most large companies with multiple levels of positions, users will need permissions and access requests to privileged accounts in order to effectively complete their day-to-day tasks. [3] The same users will need to provide justification to the server when requesting access. This is where PAM comes in to provide a secure means of communication while maintaining a well-balanced workflow.[3] PAM simplifies the process of approving or denying user access requests and logs all decisions.[3] Once approval is granted to the user, PAM temporarily provides the user higher access without manually requesting and remembering credentials for the privileged access.[3] Single Sign-On (SSO) integration which centralizes access to multiple user accounts while not compromising the integrity of passwords and Credential Management where the timespan of a password remaining valid is condensed are two examples of PAM tools.[3]<\/p>\n\n\n\n<p>Passwords, TLS certificates, and Accounts within a company are all typically secured with PAM solutions.[1] However, SSH key management is hardly discussed in this realm, simply due to the lack of technology available to implement it adequately.[1]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Why can&#8217;t PAMs handle SSH Keys?<\/h4>\n\n\n\n<p>SSH Keys are access credentials in the Secure Shell (SSH) Protocol that are like passwords but function differently when compared to passwords.[1] Keys tend to further outnumber passwords by a 10:1 ratio.[1] While only some passwords are privileged, almost all SSH keys open doors to something valuable.[1] One key also has the capability to open doors to multiple servers.[1] Implementing PAM to handle SSH keys would solve these problems. However, PAMs unfortunately don&#8217;t manage SSH keys very well. Since PAMs were built to vault passwords, doing the same with keys simply does not work as keys must be secured at the server&#8217;s side.[1] Otherwise, keeping keys under control becomes extremely difficult. Moreover, to manage these keys, our solution must first discover the keys which PAMs cannot do.[1] <\/p>\n\n\n\n<p><strong>ISSUE<\/strong>: Despite these concerns, PAMs are not complete without SSH key management. Even if an organization manages 100% of your passwords, the chances are that 80% of your critical credentials are still missing if SSH keys are not managed.[1]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What solution has been proposed to solve this issue?<\/h4>\n\n\n\n<p>Modern ephemeral access (MEA)! [1,2] With MEA, secrets needed to access a target are granted when needed and automatically expire once the authentication is done leaving a passwordless and keyless method to manage access. Passwords have been the weakest factor within cybersecurity and are the easiest to crack, forget, and lose making it a targettable source. [4,5] SSH says &#8216;the best way to manage passwords and keys is to not manage them at all&#8217;.[1,2] <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-style-plain is-layout-flow wp-block-quote-is-layout-flow\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-src=\"https:\/\/www.ssh.com\/hs-fs\/hubfs\/ZT_Suite_2024.png?width=1200&amp;height=592&amp;name=ZT_Suite_2024.png\" alt=\"ZT_Suite_2024\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading\">Figure 1: Zero Trust Suite Access Control system displaying the safety network mechanism. [2]<\/h6>\n\n\n\n<p>SSH Zero Trust Suite is a modular software suite that allows companies to communicate securely. [1,2] This suite secures communications up to a quantum-safe level in instances such as when:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>(1) Humans share sensitive data with each other,<\/li>\n\n\n\n<li>(2) Machines, systems, or data centers need to connect and<\/li>\n\n\n\n<li>(3) Experts need to access critical targets for updates maintenance, configuration, and production environment uploads.[1,2]<\/li>\n<\/ul>\n\n\n\n<p>Using techniques such as rotating passwords often, hiding shared account passwords, eliminating risky keys, and providing &#8216;just enough access&#8217;, this Zero Trust Access method significantly increases security and reduces the potential to be attacked. [1,2]<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" width=\"728\" height=\"410\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/ssh-3.jpeg\" alt=\"\" class=\"wp-image-535 lazyload\" style=\"--smush-placeholder-width: 728px; --smush-placeholder-aspect-ratio: 728\/410;width:601px;height:auto\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/ssh-3.jpeg 728w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/ssh-3-300x169.jpeg 300w\" data-sizes=\"(max-width: 728px) 100vw, 728px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" \/><\/figure>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>Figure 2: Ways in which Zero Trust Suite reduces credential risk upon eliminating passwords and keys.<\/strong> [1]<\/h6>\n\n\n\n<h4 class=\"wp-block-heading\">Has this already been implemented and tested by customers?<\/h4>\n\n\n\n<p>Yes! Zero Trust suite has been put to use with various companies. For example, Zero Trust Suite has provided tracking of user identities and a transport view into the sessions securing the VPN tunnel from unsanctioned use.[2] Likewise, a global semiconductor company fixed a security audit failure by using passwordless authentication for secure remote user access.[2] Initially, risk assessment and scanning were done using SSHerlock tools which reported access credential violations.[2] As such, the keys-violating global SSH policy was removed and replaced with keyless authentication instead of fixing the security failure.[2]<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion <\/h4>\n\n\n\n<p>Privileged Access Management or PAM plays a crucial role in securing a company&#8217;s digital infrastructure. However, while PAM has proven effective at managing passwords and traditional credentials, SSH keys, which are far more prevalent and powerful than passwords, require a new approach for proper management.[1] Modern Ephemeral Access (MEA) offers an innovative solution to this SSH key challenge.[1] By granting temporary, on-demand access without the need for long-term credentials like passwords or keys, MEA reduces vulnerabilities and streamlines privileged access within companies.[1,2] SSH Zero Trust Suite demonstrates that passwordless and keyless methods are possible and highly effective in addressing security concerns across various environments.[2]<\/p>\n\n\n\n<p>What are your thoughts on the implementation of passwordless and keyless systems within your work environment? What do you think are some challenges that may arise given traditional PAM solutions in handling modern access needs? <\/p>\n\n\n\n<h5 class=\"wp-block-heading\">References <\/h5>\n\n\n\n<p>[1] <a href=\"https:\/\/thehackernews.com\/2024\/09\/passwordless-and-keyless-future-of.html\">https:\/\/thehackernews.com\/2024\/09\/passwordless-and-keyless-future-of.html<\/a><\/p>\n\n\n\n<p>[2] <a href=\"https:\/\/www.ssh.com\/ssh-zero-trust-access-key-and-secrets-management?utm_source=paid_media&amp;utm_medium=text_link&amp;utm_campaign=thehackernews_keyless\">https:\/\/www.ssh.com\/ssh-zero-trust-access-key-and-secrets-management?utm_source=paid_media&amp;utm_medium=text_link&amp;utm_campaign=thehackernews_keyless<\/a><\/p>\n\n\n\n<p>[3] <a href=\"https:\/\/www.upguard.com\/blog\/privileged-access-management\">https:\/\/www.upguard.com\/blog\/privileged-access-management<\/a><\/p>\n\n\n\n<p>[4] <a href=\"https:\/\/statetechmagazine.com\/article\/2024\/02\/how-passwordless-authentication-supports-zero-trust-perfcon\">https:\/\/statetechmagazine.com\/article\/2024\/02\/how-passwordless-authentication-supports-zero-trust-perfcon<\/a><\/p>\n\n\n\n<p>[5] <a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/zero-trust-and-passwordless-authentication\">https:\/\/www.beyondtrust.com\/blog\/entry\/zero-trust-and-passwordless-authentication<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Privileged Access Management (PAM)? Privileged Access Management (PAM) is a package of cybersecurity strategies and access management tools utilized for controlling, monitoring, and safeguarding users with privileged access permissions.[3] A PAM system ensures your computers have a secured network that is able to decrease operational complexity and protects important resources such as data, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/09\/26\/a-passwordless-and-keyless-future-using-secure-priveleged-access-management\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;A Passwordless AND Keyless Future&#8221;<\/span><\/a><\/p>\n","protected":false},"author":677,"featured_media":442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-565","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","entry"],"featured_image_src":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/Picture2-600x400.png","featured_image_src_square":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/09\/Picture2-600x518.png","author_info":{"display_name":"Keerthana Chockalingam","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/keerthana-chockalingam\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/565","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/677"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=565"}],"version-history":[{"count":5,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/565\/revisions"}],"predecessor-version":[{"id":718,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/565\/revisions\/718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media\/442"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=565"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=565"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=565"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}