Description
SSH server private keys - files that match the /etc/ssh/*_key
glob, have to have restricted permissions.
If those files are owned by the root
user and the root
group, they have to have the 0640
permission or stricter.
If they are owned by the root
user, but by a dedicated group ssh_keys
, they can have the 0640
permission or stricter.
Rationale
If an unauthorized user obtains the private SSH host key file, the host could be
impersonated.
- ID
xccdf_org.ssgproject.content_rule_file_permissions_sshd_private_key
- References
CSC: Critical Security Controls
COBIT®: Control Objectives for Information and Related Technologies
SP 800-171 Rev. 1: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations
CCI: Control Correlation Identifier
ISA-62443-2-1-2009, Security for Industrial Automation and Control Systems Part 2-1: Establishing an Industrial Automation and Control Systems Security Program
ANSI/ISA-62443-3-3 (99.03.03)-2013 Security for industrial automation and control systems Part 3-3: System security requirements and security levels
CIP: Critical Infrastructure Protection
NIST Special Publication 800-53 (Revision 4): Security and Privacy Controls for Federal Information Systems and Organizations
Framework for Improving Critical Infrastructure Cybersecurity
PCI DSS v3: Payment Card Industry Data Security Standard
PCI DSS v4: Payment Card Industry Data Security Standard
GPOS SRG: General Purpose Operating System Security Requirements Guide