A company wants to improve the remote access process it uses for systems administrators who perform troubleshooting. Currently, troubleshooting is performed via SSH to the affected system and controlled by a border ACL. In order to SSH to a system, systems administrators must first log in to the VPN and then use a password-protected SSH key that is unique to each server. Which of the following should the company implement to improve this process and reduce the attack surface? (Choose two.)
Steel16
2 months agoSteel16
2 months ago