The Photon operating system must be configured to protect the Secure Shell (SSH) private host key from unauthorized access.
An XCCDF Rule
Description
If an unauthorized user obtains the private SSH host key file, the host could be impersonated.
- ID
- SV-258896r933749_rule
- Version
- PHTN-40-000234
- Severity
- Medium
- References
- Updated
Remediation Templates
A Manual Procedure
At the command line, run the following commands for each returned file:
# chmod 600 <file>
# chown root:root <file>
# systemctl restart sshd.service