rsnt_translations
56,430
edits
(Marked this version for translation) |
No edit summary |
||
Line 213: | Line 213: | ||
<!--T:50--> | <!--T:50--> | ||
An SSH key is | An SSH key is <b>compromised</b> when an unauthorized individual has gained access, or may have gained access, to the <i>private key</i> component of an SSH key pair. | ||
<!--T:51--> | <!--T:51--> | ||
This can occur through various means, such as | This can occur through various means, such as <i>improper key management, theft</i>, or <i>security breach</i>. | ||
<!--T:52--> | <!--T:52--> | ||
This poses a significant security risk, as a malicious actor can use it to gain unauthorized access to systems and sensitive data. | |||
To mitigate the risk associated with compromised SSH keys, the Digital Research Alliance of Canada maintains a | To mitigate the risk associated with compromised SSH keys, the Digital Research Alliance of Canada maintains a <b>Key Revocation List (KRL)</b>. | ||
<!--T:53--> | <!--T:53--> | ||
Line 227: | Line 227: | ||
<!--T:54--> | <!--T:54--> | ||
If you discover that your SSH key has been compromised, it is | If you discover that your SSH key has been compromised, it is <i>imperative</i> that you take immediate action. | ||
* Replace the compromised key with a new one to ensure that you can connect securely to Alliance services. | * Replace the compromised key with a new one to ensure that you can connect securely to Alliance services. | ||
* Remove the compromised key from ''all'' services (Alliance or other) to prevent unauthorized access or data breaches. | * Remove the compromised key from ''all'' services (Alliance or other) to prevent unauthorized access or data breaches. |