Check: RHEL-09-255115
RHEL 9 STIG:
RHEL-09-255115
(in version v2 r3)
Title
RHEL 9 SSH server configuration file must have mode 0600 or less permissive. (Cat II impact)
Discussion
Service configuration files enable or disable features of their respective services that if configured incorrectly can lead to insecure and vulnerable configurations. Therefore, service configuration files should be owned by the correct group to prevent unauthorized changes.
Check Content
Verify the permissions of the "/etc/ssh/sshd_config" file with the following command: $ sudo find /etc/ssh/sshd_config /etc/ssh/sshd_config.d -exec stat -c "%a %n" {} \; 600 /etc/ssh/sshd_config 700 /etc/ssh/sshd_config.d 600 /etc/ssh/sshd_config.d/50-cloud-init.conf 600 /etc/ssh/sshd_config.d/50-redhat.conf If the "/etc/ssh/sshd_config" permissions are not "0600", this is a finding.
Fix Text
Configure the "/etc/ssh/sshd_config" permissions to be "0600" with the following command: $ sudo chmod 0600 /etc/ssh/sshd_config
Additional Identifiers
Rule ID: SV-257999r1045061_rule
Vulnerability ID: V-257999
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000366 |
Implement the security configuration settings. |
Controls
Number | Title |
---|---|
CM-6 |
Configuration Settings |