Access & Identity
SSH Hygiene Kit
Audit and rotate SSH keys across your fleet
Inventory every SSH public key authorized on your servers, identify orphaned keys, enforce key rotation, and detect risky configurations like password-based SSH or root login. Built for ops teams managing dozens to hundreds of hosts.
Key Features
SSH key inventory
Orphaned key detection
Rotation enforcement
Config risk scanning
Multi-host bulk operations
Audit trail export
Benefits
1
Eliminate forgotten SSH access from former employees
2
Enforce key rotation policies at scale
3
Find risky SSH configurations before attackers do
Use Cases
Server access auditing
Post-employee-offboarding SSH cleanup
SOC 2 access control evidence