Skip to content

The Photon operating system must be configured to protect the Secure Shell ( SSH) private host key from unauthorized access.

An XCCDF Rule

Description

If an unauthorized user obtains the private SSH host key file, the host could be impersonated.

ID
SV-256578r991589_rule
Version
PHTN-30-000109
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

At the command line, run the following commands for each returned file:

# chmod 600 <file>
# chown root:root <file>