<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">
Curious about how StrongDM works? 🤔 Learn more here!
Search
Close icon
Search bar icon
ALL USE CASES > CONNECT

StrongDM Policy Playbook:
Require MFA for Production SSH Servers

This policy requires MFA when connecting to production Linux servers via SSH.

Code Sample

Loading...
Copied to clipboard!

Video Demo

Why It Matters? 

A common technique during a data breach is to use stolen credentials, including SSH keys, to find areas where an attacker can elevate their privileges. This is done to obtain access to compute resources to establish a command and control (C2) channel, execute malicious actions such as lateral movement, or deploy malware or back doors.


What Exactly Does This Policy Do?

This policy helps contain an attack and persistent threats by enforcing an MFA prompt for privileged users before they are allowed to connect to production Linux servers. This requirement ensures that users must prove their identity, helping to prevent unauthorized access and reduce the risk of compromise from stolen credentials.

new-strongdm-desktop-app-ui
Want to learn more?
See StrongDM in action. 👀