...
- http://thinkhole.org/wp/2006/10/30/five-steps-to-a-more-secure-ssh/
- http://www.mysql-apache-php.com/ssh-attacks.htm
- http://samcaldwell.net/index.php/technical-articles/3-how-to-articles/39-how-do-i-secure-ssh-properly
We store all of our SSH users and their public keys in an internal secure location.