SSH CA private key disclosure
- Mitigation
- Key never leaves the managed KMS. Signing operations are asymmetric-sign API calls. No code path reads key material into process memory.
- Detection
- Audit trail on KMS Sign calls; alert on volume anomalies; quarterly access review.
- Recovery
- Key rotation runbook; bulk re-issuance of trusted CA keys to all enrolled hosts.