Growth of Linux Deployments Creates Need for Linux Security The growth of Linux deployments has accelerated exponentially. One of the biggest sectors of this increase has been in the cloud, where Linux’s flexibility as an automated platform is particularly convenient. According to a recent estimate, Linux is used for 79 percent of cloud deployments.
The increased popularity of Linux, however, has also led to a rise of security vulnerabilities on the platform. Unsecured Linux servers are often attacked because of poor privileged credential management. Default passwords that are never changed, cryptographically weak passwords set for human convenience, and sudo settings with unknown consequences are common Linux security challenges.
Privileged Access Management for the Linux Enterprise
With the release of Enterprise Random Password Manager™ (ERPM) v5.5.0, Lieberman Software significantly improved Linux security, whether on premises or in the cloud. ERPM contains cyber attacks that penetrate the network perimeter. It does so by securing the privileged accounts needed to access critical systems.
With the new version of ERPM, Linux privileged accounts become a moving target for attackers. Privileged access is locked down to satisfy internal security and regulatory compliance audit requirements – even for the root user.
“Linux requires security that can be every bit as flexible and automated as it is,” said Jonathan Sander, VP of Product Strategy at Lieberman Software. “ERPM provides exactly the scale, speed, and automation required to match the needs of the dynamic Linux world.”
ERPM’s Linux Security Features
- Linux Discovery – ERPM can build an inventory of Linux systems. It scans the network, identifies systems, and starts managing them. ERPM also finds accounts, SSH Keys, sudo policies and more. This allows users to secure their systems quickly and efficiently.
- Password Rotation – ERPM removes Linux privileged passwords from people’s heads, notebooks, and spreadsheets and puts them in a secure, encrypted library. Only authorized and audited personnel can access the passwords.
- Full sudo Policy Visibility – ERPM takes in sudoers policy files from every host it manages and lays out the policies in place for each one of them. Users can see how and where privileges are granted.
- SSH Key Pair Discovery and Management – ERPM finds SSH key pairs, catalogs them, and shows where they exist. It can use SSH key pairs for all its own connections to improve security and rotate critical SSH keys.
- Script & Orchestration Friendly – ERPM offers comprehensive web services in SOAP and JSON formats. There’s no need for Linux administrators to compromise on their scripting, automation, orchestration and application integration duties.