About SSH risks and how to resolve them
This section details the following high-risk violations and provides steps to remediate them.
SSH risks and how to remediate them
Violation |
Policy |
Remediation Options |
---|---|---|
Root Access Orphan |
|
|
Client Access Orphan |
|
|
Root Access NOTE Shown only if not a Root Access Orphan. |
|
|
Duplicate Client Private Key NOTE Shown only if not a Shared Private Key. |
|
|
Duplicate Host Private Key NOTE Shown only if not a Shared Private Key. |
|
|
Shared Private Key |
|
|
Key Length ≤ 768 NOTE Shown only if Key Smaller Than Required is not shown. |
|
|
Key Smaller than Required |
|
|
Vulnerable Protocol |
|
|
Environment Crossing |
|
|