About SSH risks and how to resolve them
                                                        
This section details the following high-risk violations and provides steps to remediate them.
SSH risks and how to remediate them
| 
                                                                     Violation  | 
                                                                
                                                                     Policy  | 
                                                                
                                                                     Remediation Options  | 
                                                            
|---|---|---|
| 
                                                                     Root Access Orphan  | 
                                                                
                                                                     
  | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Client Access Orphan  | 
                                                                
                                                                     
  | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Root Access NOTE Shown only if not a Root Access Orphan.  | 
                                                                
                                                                     
                                                                          | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Duplicate Client Private Key NOTE Shown only if not a Shared Private Key.  | 
                                                                
                                                                     
                                                                          | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Duplicate Host Private Key NOTE Shown only if not a Shared Private Key.  | 
                                                                
                                                                     
                                                                          | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Shared Private Key  | 
                                                                
                                                                     
  | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Vulnerable Protocol  | 
                                                                
                                                                     
                                                                          | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Environment Crossing  | 
                                                                
                                                                     
  | 
                                                                
                                                                    
  | 
                                                            
| 
                                                                     Invalid Permissions  | 
                                                                
                                                                     
                                                                          | 
                                                                
                                                                    
 
  | 
                                                            
| 
                                                                     Key is Symbolic Link  | 
                                                                
                                                                     
                                                                          | 
                                                                
                                                                    
  |