6.5.4 (L1) Host SSH daemon, if enabled, must not allow host-based authentication

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Ensuring the SSH daemon on the host disallows host-based authentication is a crucial step towards hardening system services. This prevents a host from authenticating on behalf of the users, thereby enforcing individual accountability and minimizing the risk of unauthorized access.

Disallowing host-based authentication enforces a more secure user authentication mechanism, promoting individual accountability. It minimizes the risk associated with trust relationships among hosts, thereby enhancing the overall security of the system.

Solution

Impact:

No functional impact is associated with this control. It solely acts to enhance security by enforcing stricter authentication practices, without hindering system operations.

See Also

https://workbench.cisecurity.org/benchmarks/15784