Create SSH CBOM example
From a Slack discussion:
SSH keys, SSH config, KeyStores, SSH certificates and x509 context.
https://cyclonedx.slack.com/archives/C05E2FLUTNH/p1760515550499579
As part of the inventory of certain SSH keys, the following requirements should be considered as important attributes.
Key name: A name given to the key based on the comments and its fingerprint
uuid key: A universal unique identifier to identify an SSH key
Key Type: Private or public
Key path: Complete path of the key files
Key permissions: Permissions associated with the key
Format : RFC 4716
Key description : If possible, provide a more complete description of the key with, for example, "SSH key – user: john.doe – SHA256:a6w8tg145"
Key creation date : Key file creation date
Key first discovery: Date of first discovery
Key last discovery Date of last discovery
Key Hash: Hash / fingerprint of a key
Key length: The length of the key
Key purpose description: Example: Connect to remote servers, Person to Machine, Machine to Machine, Machine to Machine secure file transfers (with authentication between services), port forwarding, automated tasks (like CI/CD), tunneling and port forwarding automated transfers.
Association / Key configuration option : Option restricting or customizing key usage. For example: specification of authorized IP ranges, restricted command option port forwarding
Location / environment where the key is detected: Client operating system: Linux, Windows and macOS Server operating system: Linux and Windows Network equipment: routers, switches, firewall Virtualization and cloud: Virtual machines, containers, cloud administration
User or account: User or account associated with the SSH key
Network flows: Scans SSH server/client logs to associate the network flows on which the SSH key was used
Signature Algorithm type: The type of algorithm associated with the key Complete list::
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
- [email protected]
Supported algorithms::
- rsa-sha2-256
- rsa-sha2-512
- ecdsa-sha2-nistp256
- ecdsa-sha2-nistp384
- ecdsa-sha2-nistp521
- ssh-ed25519
- ssh-dss
- ssh-rsa