(Open)SSH secure use recommendations

Commonly used for remote administration, transferring files, forwarding and encapsulating sensitive flows, OpenSSH has become a key element of a large number of IT systems.

Publié le 04 Septembre 2015 Mis à jour le 04 Septembre 2015

Therefore, it is critical to control its configuration, harden its installation and apply strict hygiene rules for its operation. The recommendations presented in this document cover all these different aspects.

This technical document is intended for network and system administrators and integrators who care about properly installing and administrating an infrastructure with the help of the SSH protocol and its reference implementation: OpenSSH.