5.3.33 Ensure SSH uses privilege separation

Information

The operating system must be configured so that the SSH daemon uses privilege separation.

Rationale:

SSH daemon privilege separation causes the SSH process to drop root privileges when not needed, which would decrease the impact of software vulnerabilities in the unprivileged section.

Solution

Uncomment the UsePrivilegeSeparation keyword in /etc/ssh/sshd_config (this file may be named differently or be in a different location if using a version of SSH that is provided by a third-party vendor) and set the value to sandbox or yes:
Example: vim /etc/ssh/sshd_config
Add, uncomment or update the following line:

UsePrivilegeSeparation sandbox

The SSH service must be restarted for changes to take effect.

# systemctl restart sshd.service

See Also

https://workbench.cisecurity.org/files/3636

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CCI|CCI-000366, CSCv6|3.1, CSCv7|8.3, Rule-ID|SV-204601r603261_rule, STIG-ID|RHEL-07-040460

Plugin: Unix

Control ID: 3beff51c735068ab7fe30c94d4a28d9e088bb98a656a7262e16f74ccec2a897c