Tip 2: Limit ingress points for remote management traffic If you're feeling overwhelmed and don't know where to start, Enable Sysadmin has you covered with an article about locking down SSH. Be sure to check out the sshd_config man page for more information. SSH is highly configurable, and you can implement plenty of security enhancements, such as disabling weaker ciphers or limiting the use of particular SSH keys to specific IP addresses.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |