Because of their simplicity and popularity, SSH keys have become a popular attack vector for the unauthorized access of server infrastructure, despite the wide availability of key management tooling.
In this ebook, we’ll walk through the risks associated with SSH keys, and how to implement security best practices to help avoid attacks using Teleport.