structure updates
This commit is contained in:
24
tech_docs/linux/ssh_best_practices.md
Normal file
24
tech_docs/linux/ssh_best_practices.md
Normal file
@@ -0,0 +1,24 @@
|
||||
## SSH Key Management Best Practices
|
||||
|
||||
### 1. Key Storage and Permissions
|
||||
- **Private Keys**: Store in a secure directory, typically `~/.ssh`, with directory permissions set to `700`. Private key files should have read-only permissions for the owner, set via `chmod 400 /path/to/private/key`.
|
||||
- **Public Keys**: Deploy to `~/.ssh/authorized_keys` on target systems with restrictive access settings.
|
||||
|
||||
### 2. Key Security Enhancements
|
||||
- **Passphrases**: Encrypt private keys using strong, complex passphrases to protect against unauthorized use.
|
||||
- **Key Rotation**: Regularly update and rotate SSH keys to mitigate risks associated with key exposure.
|
||||
|
||||
### 3. Configuration and Usage Restrictions
|
||||
- **Protocol Usage**: Ensure SSH configurations are set to use SSH Protocol 2 exclusively by setting `Protocol 2` in SSH config files.
|
||||
- **Authorized Keys Options**: Limit key usage by configuring options in `authorized_keys` for specific IP addresses, permissible commands, and other restrictions.
|
||||
|
||||
### 4. Advanced Security Practices
|
||||
- **SSH Agents**: Utilize SSH agents for secure, in-memory storage of decrypted keys, facilitating easier and safer key usage across sessions.
|
||||
- **Audit and Monitoring**: Conduct frequent audits of `authorized_keys` and review server logs to detect and respond to unauthorized access attempts or anomalous activities.
|
||||
|
||||
### 5. Implementation and Compliance
|
||||
- **Compliance**: Adhere to organizational security policies and compliance requirements regarding SSH key management to ensure uniform security postures across all systems.
|
||||
- **Documentation**: Maintain comprehensive documentation of key generation, deployment, and revocation procedures to support security audits and troubleshooting.
|
||||
|
||||
### Conclusion
|
||||
Adopting these SSH key management best practices will enhance security and operational efficiency. Regular reviews and updates of SSH key management strategies are recommended to address emerging threats and technological advancements.
|
||||
Reference in New Issue
Block a user