Best practices for securing SSH access to VM instances
Stay organized with collections
Save and categorize content based on your preferences.
When you grant users access to connect to virtual machine (VM) instances using
SSH, you impact the security of your VM and any resources that your VM has
access to, such as storage buckets or databases.
You can limit the risks related to SSH access by following several best practices,
including:
Control network access:
Implement zero trust access controls to restrict the networks, locations, and
devices from which users can establish SSH connections to your VMs,
and avoid VMs from being more exposed than necessary.
Control SSH login access:
Restrict which users are allowed to establish SSH sessions and ensure that login
access is revoked in a timely manner.
Protect SSH credentials:
Require users to authenticate with multiple factors and protect credentials from
being leaked.
Audit SSH access: Maintain a
reliable audit trail that tracks all SSH access.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-05 UTC."],[[["Granting users SSH access to virtual machines (VMs) can impact the security of the VM and resources it accesses."],["Implement zero trust access controls to limit the networks, locations, and devices from which SSH connections to VMs can be established."],["Restrict which users can establish SSH sessions and ensure timely revocation of login access."],["Require multi-factor authentication and safeguard credentials to protect against leaks."],["Maintain a reliable audit trail to monitor all SSH access."]]],[]]