Non-Corporate Authentication Key

Risk Level

Hazardous (3)

Compliance Frameworks
  • APRA
  • ,
  • MAS
  • ,
  • NIST 800-53 (Rev. 4)

About Non-Corporate Authentication Keys

Secure Shell (SSH) is a communication protocol used to establish a secure connection with a remote computer. By default, SSH encrypts all communications between a server and a client, making it an ideal choice, even for insecure networks.

There are different ways to authenticate users while performing an SSH login. The simplest is via passwords, which are easy to use and set up, but not the most reliable authentication method. A safer alternative is to use SSH key pairs.

An SSH key pair consists of a private and a public key. Each pair is cryptographically generated, such that messages encrypted with the public key can only be decrypted using the private key. The private key is stored on the client machine and must be kept secret at all times.

The public key is stored in a special file on the remote server, known as the authorized_keys file. As the name indicates, this file contains the public keys of all the authorized users who can access the remote server. Typically, whenever a new public key is added, the creator’s username and email is appended to the file as a comment.

Once a user’s public key has been installed on a remote server, they can use the ssh command to log in without having to enter a password. Behind the scenes, the server tests whether the client has the appropriate private key.

Cloud Risk Description

Even though SSH keys are intrinsically more secure than passwords, their installation needs to be carefully managed and monitored. If a malicious actor succeeds in copying their own public key to the authorized_keys file, they will then have the persistent ability to log in.

Illegitimately added keys usually have non-corporate usernames and email addresses. This is why it’s important to periodically scan the authorized_keys file for non-corporate entries.

How Does Orca Help?

Orca scans your entire cloud estate for exposed keys, passwords in shell history, vulnerabilities, and other information that an attacker can leverage to move laterally in your environment. Orca looks for the use of non-corporate account keys and will alert on this type of issue as shown in the screenshot above.


Orca Security, the cloud security innovation leader, provides cloud-wide, workload-deep security and compliance for AWS, Azure, and GCP - without the gaps in coverage, alert fatigue, and operational costs of agents.