Today I explored ssh-audit, a tool designed to audit SSH configurations. Although it’s an excellent tool, I found the hardening guides somewhat lacking. Hence, I decided to write a detailed walkthrough, ensuring the ssh/sshd configurations are easily readable.
Detect if you are running a known-vulnerable version of OpenSSH, which wouldn’t be an issue if you keep good patch hygiene and install your SSH server through you operating systems’ package manager
Scripting, to confirm that a large fleet of boxes are all running according to your policy. Verification that the config you want is actually the config you have.
Cool,.but from the post it seems like all it does is:
So what’s the point? Who is this for?
Scripting, to confirm that a large fleet of boxes are all running according to your policy. Verification that the config you want is actually the config you have.
This is exactly what I use it for 👌 very handy for this