Honestly, one isn’t better than the other. It’s more of a “what can they do” if they gain access. With SSH you likely have terminal access wherever. VPN means you need to be able to talk to the service and even then it’s usually just network access. Attackers have to break in further once there.
I would rather neither, but of the two I have good firewall rules internally. And failed ssh access internally is reported immediately.
Sure, but my question was about exposing ssh compared to exposing a VPN.
Honestly, one isn’t better than the other. It’s more of a “what can they do” if they gain access. With SSH you likely have terminal access wherever. VPN means you need to be able to talk to the service and even then it’s usually just network access. Attackers have to break in further once there.
I would rather neither, but of the two I have good firewall rules internally. And failed ssh access internally is reported immediately.