The Proxmox VE Cluster uses port 22 (SSH) for data synchronization. In principle, every PVE host in the cluster has equal rights and can connect to every other PVE host in the cluster using SSH. As a result, an attacker who manages to break out of an LXC container or a KVM guest on any PVE host can gain access to the entire PVE cluster as long as they gain access to root's SSH keys. Although this requires some effort and skill from an attacker, this possibility must be taken into account due to the far-reaching consequences of such an attack.
What options and recommendations are there to minimize this attack vector?
What options and recommendations are there to minimize this attack vector?