(Open)SSH secure use recommendations

Commonly used for remote administration, transferring files, forwarding and encapsulating sensitive flows, OpenSSH has become a key element of a large number of IT systems.

Therefore, it is critical to control its configuration, harden its installation and apply strict hygiene rules for its operation. The recommendations presented in this document cover all these different aspects.

This technical document is intended for network and system administrators and integrators who care about properly installing and administrating an infrastructure with the help of the SSH protocol and its reference implementation: OpenSSH.

  • pdf

    (Open)SSH secure use recommendations

    1.05 Mo