Authentication

SSH login permitted for root

Platform(s)
  • N/A

Compliance Frameworks

Description

The SSH configuration on the operation system is set to permit root login. Root login with SSH is vulnerable to brute force attacks, which could result in asset compromise if successful.