(no title)
tgeek
|
10 years ago
I find the better pattern here is to limit and discourage SSH and then monitor and log the hell out of it. There are numerous tools out there that can centralize any actions being taken on a host and sending it to a log that can be centralized. Outright removing all SSH puts you in a rough spot if things go south with some piece of software that your system monitoring/centralized logging don't cover 100%, and makes it way hard to do things like strace on a process.
grhmc|10 years ago
aalbertson|10 years ago
Sanddancer|10 years ago
sneak|10 years ago