Explore key practices for managing SSH keys and access controls to ensure secure team collaboration. This quiz tests your understanding of authentication methods, access rights, and effective management of sensitive credentials in collaborative environments.
Which statement best describes the advantage of using SSH key pairs over passwords for remote server access?
Explanation: SSH key pairs are considered more secure than passwords because they use asymmetric encryption, making unauthorized access much harder. While passwords might be easily forgotten, this is unrelated to their security. SSH key pairs can be used over different networks, not just the same one. While SSH keys improve security, they do not remove the need for two-factor authentication in high-security environments.
If multiple team members require access to a single server, which is the most secure way to manage their SSH keys?
Explanation: Assigning each team member a personal account with an individual key allows for granular control and easy revocation if needed. Sharing a private key compromises security, as does using the default 'root' account for everyone. Sending passwords and keys through email is insecure and violates best practices for sensitive credential handling.
A team member is leaving the project. What is the most appropriate action to ensure their SSH access is instantly revoked?
Explanation: By removing the team member's public key from the server's authorized_keys file, you ensure they can no longer access the server. Changing the hostname or updating the operating system does not affect individual access. Relying on the departing member to delete their private key is ineffective, as they may not comply or could have backups elsewhere.
What is the recommended practice for storing private SSH keys used for secure collaboration?
Explanation: Encrypting the private key with a passphrase and setting strict file permissions adds layers of protection against unauthorized access. Sharing private keys in a public or cloud folder exposes the key to multiple parties and increases risk. Leaving keys unencrypted is unsafe, and uploading private keys to the server is not recommended as it defeats the purpose of public/private key separation.
How does applying the principle of least privilege help secure SSH-based collaboration within a team?
Explanation: Granting users only the permissions required for their work minimizes potential damage caused by accidental or malicious actions. Allowing all users administrative access contradicts security best practices. Using a single shared key or providing unrestricted directory access creates vulnerabilities and reduces accountability.