-
Dec 10, 2020
TL;DR Protecting your system from accidental or malicious change is made simpler by allowing users only limited access. This especially means limiting users who have root or ‘superuser’ access as these users have effectively unlimited power. When
it is necessary for a user to have this access it is best that they have a normal (unprivileged) account for day-to-day activities with the ability to temporarily promote themselves to ‘superuser’ to run commands that require this elevated access.
-
Dec 7, 2020
TL;DR Tempting though it may be, blindly enabling SSH on all your servers is a huge mistake.