That supplier wants to have a shell on our box

You are the security manager and a project manager comes to you and say: that supplier wants to have a shell on our box.

What is your advice, let him have it or not, under which conditions?


As a cybersecurity manager, my default position is “no direct shell access” — and if there is a strong business need, it must be exception-based, tightly controlled, and risk-accepted by management.

Quick answer

Do not give a supplier a shell on our system by default. Only allow it if there is a documented business necessity, and only under strict security, legal, and technical controls.

The verdict

  • default response: no shell access
  • exception: yes, only with:
    • clear business need
    • no safer alternative exists
    • strong technical controls are in place
    • legal coverage
    • continuous monitoring
    • time-limited approval