STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269120

CAT II (Medium)

AlmaLinux OS 9 must force a frequent session key renegotiation for SSH connections to the server.

Rule ID

SV-269120r1050610_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-000068

Discussion

Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, nonorganization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. Session key regeneration limits the chances of a session key becoming compromised.

Check Content

Verify the SSH server is configured to force frequent session key renegotiation with the following command:

$ sshd -T | grep rekeylimit

rekeylimit 1073741824 3600

If "RekeyLimit" does not have a maximum data amount and maximum time defined, this is a finding.

Fix Text

Configure AlmaLinux OS 9 to force a frequent session key renegotiation for SSH connections to the server by running the following command:

$ echo "RekeyLimit 1G 1h" > /etc/ssh/sshd_config.d/40-rekeylimit.conf