
This role contains around 150 controls from the 270+ controls that exist in the RHEL 6 STIG. New controls are still being added. Implements: blueprint security-hardening Change-Id: I0578f86bf42d55242bc72b97b40a5935a3cb18d6
632 B
632 B
Although the STIG recommends disabling root logins via ssh, the default in this role is to allow it. The openstack-ansible deployment uses the root user by default at this time, but that may change later and allow for this configuration to be set.
To disallow root logins via ssh, simply adjust this configuration variable:
ssh_permit_root_login = 'no'
NOTE: The quotes around 'no'
or
'yes'
are very important. Ansible will treat
no
and yes
as booleans by default and that
will cause a True
to land in your sshd configuration file.
This will causes errors during sshd's startup.