persistence
SSH
private keys
Theft of Stealing SSH private key is a widely used method to maintain access even after the user changes his password.
This is also covered by the MITRE ATT&CK framework: https://attack.mitre.org/techniques/T1145/
Example of private SSH keys lying in the computer
Example case I: A development server that compiles, pulls/pushes code from a central code repository, and deploys the application/software on a test server might have private keys of deployment server and code server (to automate things and avoid credentials every time).
Example case II: For automation, a lot of tools like Ansible, use SSH-based connections to multiple target machines, and perform a set of pre-defined actions. In this case, the machine hosting the Ansible will have the private keys.