I know one systems administrator who runs SSH Server on his workstation to push files to it and check things from a phone but I think it is a bad idea for several reasons:
- An operations workstation is a sweet spot for the adversary. Once she is in, she won't find a better place to get access to other places.
- If you get hacked anywhere then you don't know which other systems got affected - you have to check everything. How do you check? Maybe walk over to the server room with a Live CD. Maybe your data center is too large. Analyze logs, recent snapshots, start logging in to places. But very likely, at some point your workstation will be involved.
Lets only assume that there is nothing stopping the systems admin from performing all remote management tasks from the workstation. The admin would need to type in passwords and/or use certificates that are stored on the workstation. No two-factor authentication is being used.
What is the risk in running an sshd on an operations workstation?
(Shouldn't that workstation have a no-incoming-connections firewall?)