SSH Deployment Security Setup
Secure SSH deployment: generate key pairs, create passphrases, and set up key fingerprint verification.
이 레시피 활용 시점
Set up SSH keys for CI/CD deployment pipelines. Secure key pairs with passphrases and fingerprint verification to prevent unauthorized server access.
단계
SSH Key Generator
이 도구 사용해보기 →Generate deployment key
Passphrase Generator
이 도구 사용해보기 →Create key passphrase
Hash Calculator
이 도구 사용해보기 →Create key fingerprint
자주 묻는 질문
Should CI/CD SSH keys have passphrases?
For interactive use, yes. For automated CI/CD, a passphrase complicates automation. Instead, use deploy keys with restricted permissions, IP allowlisting, and short-lived certificates.
How do I restrict SSH key access?
Use authorized_keys options: command restriction (force specific command), from restriction (IP whitelist), no-port-forwarding, and no-X11-forwarding. Principle of least privilege.
관련 레시피
Secure Password Workflow
Generate a strong password, verify its strength, and hash it for storage — a complete password security pipeline.
Web Security Header Audit
Audit your website's security headers, generate a CSP policy, evaluate it, and configure CORS.
JWT Authentication Setup
Set up JWT-based authentication: generate tokens, create signing keys, and implement TOTP for 2FA.
API Security Hardening
Harden your API with HMAC request signing, secure secrets, and SRI for client-side integrity.