Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Secure Access To Linux VMs: SSH Security Guide

Practical linux identity management guide, focused on helping you secure SSH access to Linux VMs

Download

Secure Shell Protocol (SSH) is the most common Linux identity management tool and it is an indispensable part of every sysadmin’s toolbox. While many people use it, very few are aware of the possible security threats that insecure implementations can introduce in an environment.

In this whitepaper, we will help you protect your Ubuntu estate by:

  • Providing a brief technical overview of the SSH protocol and main authentication methods
  • Describing the most popular attack vectors
  • Explaining strategic and practical ways to secure SSH access to cloud and on premise hosts

A practical guide to linux identity management

While this whitepaper will reference some specific Ubuntu technologies, the key concepts and recommendations apply to every Linux OS. You can start applying these principles by downloading Ubuntu Server or by running an instance on any of the major clouds, from Azure and Google Cloud Platform to AWS.

If you want to learn more about the topic, you can refer to our technical documentation.

Contact information
  • In submitting this form, I confirm that I have read and agree to Canonical's Privacy Notice and Privacy Policy.