Discovering SSH keys
SSH, or secure shell, is a common login service that various system administrators implement in their infrastructure. The fast and secure system makes the service ideal for security purposes, as well as "feasibility" due to its key-like infrastructure. The keys make authentication seamless, much like we did back in Chapter 1, Building Your AWS Environment, with the keys that we downloaded from our AWS instance. Those keys give us "the keys to the kingdom," so to speak, and allow us access to our AWS instances.
How the keys work
A private and public key must be made to use the service. When creating a key pair, a private key is generated and stored on the system. In this case, the keys are stored in our EC2 instances. Private keys are keys that should never be shared with anyone, ever. Recent years have shed light on private exposures and the damage they have caused companies.