Skip to content
arrow_back
search
ISM-0484 policy ASD Information Security Manual (ISM)

Configure SSH for Enhanced Security

Ensure the SSH service is secure by limiting access, disabling root login, and enforcing strict authentication measures.

record_voice_over

Plain language

Securing SSH (Secure Shell) is important because it is like a secret entrance into your computer systems. If it's left open or not properly guarded, someone could sneak in and cause harm, such as stealing sensitive information or damaging your systems.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The SSH daemon is configured to: - only listen on the required interfaces (ListenAddress xxx.xxx.xxx.xxx) - have a suitable login banner (Banner x) - have a login authentication timeout of no more than 60 seconds (LoginGraceTime 60) - disable host-based authentication (HostbasedAuthentication no) - disable rhosts-based authentication (IgnoreRhosts yes) - disable the ability to login directly as root (PermitRootLogin no) - disable empty passwords (PermitEmptyPasswords no) - disable connection forwarding (AllowTCPForwarding no) - disable gateway ports (GatewayPorts no) - disable X11 forwarding (X11Forwarding no).
policy ASD Information Security Manual (ISM) ISM-0484
priority_high

Why it matters

If sshd is not hardened (e.g., root login, forwarding or X11 enabled), attackers can gain unauthorised access, pivot internally and exfiltrate data.

settings

Operational notes

Periodically review sshd_config and validate: ListenAddress set, Banner configured, LoginGraceTime <= 60, and root, empty passwords, forwarding and X11 are disabled.

Mapping detail

Mapping

Direction

Controls