Other Articles

Servers – Ensure SSH SSHD Config Permissions Are Configured

Support > Fixing Checks > Server

06 March, 2026

This check ensures that permissions and ownership of /etc/ssh/sshd_config are securely configured.

The /etc/ssh/sshd_config file contains critical SSH daemon configuration settings. Improper permissions may allow unauthorized users to modify SSH behavior, potentially leading to security vulnerabilities and unauthorized access.

Check Details

  • Resource: Server
  • Check: Ensure permissions on SSHD config are configured
  • Risk: Incorrect permissions may allow non-privileged users to modify SSH configuration, leading to potential unauthorized access or system compromise.

Remediation Steps

  1. Open a terminal session on the server with root or sudo privileges.
  2. Verify current permissions and ownership of the SSH configuration file:

    stat /etc/ssh/sshd_config
    
  3. Ensure that the file is owned by root user and root group:

    chown root:root /etc/ssh/sshd_config
    
  4. Set secure permissions so that only the owner has read and write access:

    chmod og-rwx /etc/ssh/sshd_config
    
  5. Re-run the verification command to confirm the correct configuration:

    stat /etc/ssh/sshd_config
    
  6. Confirm that the output reflects:

    • Owner: root
    • Group: root
    • Permissions: 600 (-rw-------)
  7. Perform periodic audits to ensure permissions remain correctly configured.