Cloudflare Now Let's You Manage SSH Via the Cloudflare Dashboard
Cloudflare Now Let's You Manage SSH Via the Cloudflare Dashboard
Introduction
Cloudflare has introduced "Access for Infrastructure" as part of its Zero Trust network services, aiming to simplify and secure access to servers, databases, and other critical systems. This is done through the integration of short-lived SSH certificates, making it easier for organizations to apply Zero Trust principles across their infrastructure. Traditional methods like long-lived credentials often introduce risks and complexities. In contrast, short-lived certificates, issued by a Cloudflare-managed Certificate Authority (CA), accessible through the Cloudflare dashboard, are designed to reduce vulnerabilities, eliminate the need for manual key management, and enhance overall security.
Manage SSH Access Within Cloudflare
The integration of Cloudflare's new feature means organizations can now manage SSH access natively within Cloudflare's infrastructure protection platform. By leveraging single sign-on (SSO), multi-factor authentication (MFA), and device posture, organizations can eliminate the risks associated with managing SSH keys and passwords. Policies can also be centrally managed, ensuring that only the right individuals have access to the right servers at the right time, all while maintaining clear audit trails.
Dynamic SSH Certificates for Enhanced Security
A key part of this new approach is eliminating traditional SSH credentials in favor of dynamic SSH certificates. These certificates are valid for only a short duration, allowing secure SSH access while eliminating risks associated with long-term credentials that could be compromised. Importantly, organizations do not need to alter existing SSH workflows—developers can continue using their preferred SSH clients, while Cloudflare manages access seamlessly in the background.
Current Approach: Manually Manage SSH
Currently, clients must manually manage SSH keys and passwords for each server, often resulting in long-lived credentials that can be easily compromised. This process involves generating SSH keys, distributing them securely, configuring each server to trust specific keys, and rotating keys periodically to mitigate security risks. Additionally, maintaining visibility over who has access to which servers can be cumbersome, especially in large environments.
New Approach: Manage SSH Via the Cloudflare Dashboard
With Cloudflare's new Access for Infrastructure, clients can simplify this entire process. Instead of managing and distributing SSH keys, clients configure their servers to trust a Cloudflare-managed Certificate Authority (CA). This setup allows Cloudflare to dynamically issue short-lived SSH certificates, eliminating the need for static, long-lived credentials. Access policies are centrally managed through Cloudflare's platform, which determines who can access which server, and logs all activities for compliance. Going forward, this approach reduces the administrative burden while enhancing security, as credentials are no longer a static element that attackers can exploit.
Improved Workflow with SSH Command Logs
For compliance and visibility, Cloudflare captures SSH command logs through an SSH proxy, allowing organizations to review developer activities while ensuring logs remain encrypted at rest. This integration into Cloudflare's Secure Access Service Edge (SASE) architecture enables organizations to enforce robust access controls without compromising on usability, scalability, or security. Access for Infrastructure is currently available for free to teams under 50 users and seamlessly integrates with existing Cloudflare setups, helping organizations accelerate their journey toward Zero Trust infrastructure.
Source: Cloudflare Blog - Fearless SSH: short-lived certificates bring Zero Trust to infrastructure
Image: Roman from Pixabay
Image: Cloudflare
Comments
Post a Comment