The Photon operating system must be configured to protect the Secure Shell ( SSH) private host key from unauthorized access.
An XCCDF Rule
Description
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
- ID
- SV-256578r991589_rule
- Version
- PHTN-30-000109
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
At the command line, run the following commands for each returned file:
# chmod 600 <file>
# chown root:root <file>