{"id":1775,"date":"2025-03-11T22:52:01","date_gmt":"2025-03-11T19:52:01","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/"},"modified":"2025-03-11T22:52:01","modified_gmt":"2025-03-11T19:52:01","slug":"securing-your-linux-server-limiting-sys-access-for-non-root-users","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/","title":{"rendered":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>Linux servers are a popular choice for hosting applications and services due to their stability, flexibility, and open-source nature. However, with great flexibility comes responsibility. As an administrator, you need to ensure that your systems are secure from potential security breaches and unauthorized access. One of the critical areas where permissions can be tightened is in the <code>\/sys<\/code> filesystem, which exposes a wealth of kernel and device information. In this article, we will explore practical techniques to limit access to <code>\/sys<\/code> for non-root users, enhancing the overall security of your Linux server.<\/p>\n<p><\/p>\n<h2>Understanding the \/sys Filesystem<\/h2>\n<p><\/p>\n<p>The <code>\/sys<\/code> filesystem is a virtual filesystem in Linux that provides a view into the kernel&#8217;s view of the system. It is part of the sysfs interface and exposes various kernel parameters, device drivers, and hardware configurations in a hierarchical structure.<\/p>\n<p><\/p>\n<p>While <code>\/sys<\/code> is useful for debugging and monitoring, it can also be a target for malicious users who may want to gain insights into the system&#8217;s inner workings. Limiting access to <code>\/sys<\/code> can help shield sensitive information and restrict user actions that could harm the system.<\/p>\n<p><\/p>\n<h2>Why Limit Non-Root Access?<\/h2>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Data Exposure<\/strong>: <code>\/sys<\/code> contains information about hardware configurations, processor details, and system parameters that could be useful for an attacker.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Malicious Changes<\/strong>: Non-root users should not have the ability to modify kernel settings that could affect the stability and security of the entire system.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Compliance Requirements<\/strong>: Regulatory frameworks may require you to restrict access to certain files or directories, including <code>\/sys<\/code>.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Steps to Limit \/sys Access for Non-Root Users<\/h2>\n<p><\/p>\n<h3>Step 1: Review Current Permissions<\/h3>\n<p><\/p>\n<p>Before implementing any changes, it&#8217;s essential to review the current permissions on the <code>\/sys<\/code> filesystem.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">ls -ld \/sys<\/code><\/pre>\n<p><\/p>\n<p>You will typically see it has <code>dr-xr-xr-x<\/code> permissions for users, meaning that anyone can read but cannot write to the files. It\u2019s important to understand this baseline before making adjustments.<\/p>\n<p><\/p>\n<h3>Step 2: Identify Sensitive Areas<\/h3>\n<p><\/p>\n<p>Identify which parts of <code>\/sys<\/code> are particularly sensitive. Here are a few examples:<\/p>\n<p><\/p>\n<ul><\/p>\n<li><code>\/sys\/class<\/code>: Exposes device information.<\/li>\n<p><\/p>\n<li><code>\/sys\/kernel<\/code>: Contains kernel parameters.<\/li>\n<p><\/p>\n<li><code>\/sys\/module<\/code>: Exposes loaded kernel modules.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>Focusing on these areas will allow you to apply granular permission changes.<\/p>\n<p><\/p>\n<h3>Step 3: Create User Groups<\/h3>\n<p><\/p>\n<p>Create a specific user group that will have limited access to <code>\/sys<\/code>. For example, you might create a group named <code>sysusers<\/code>.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo groupadd sysusers<\/code><\/pre>\n<p><\/p>\n<p>Add users who require limited access to manage their permissions without giving them full root capabilities.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo usermod -aG sysusers username<\/code><\/pre>\n<p><\/p>\n<h3>Step 4: Modify Permissions with Caution<\/h3>\n<p><\/p>\n<p>Using Linux permissions allows you to change who can read and write to specific directories. However, it&#8217;s crucial to approach this cautiously:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Use ACLs (Access Control Lists)<\/strong>: Instead of changing the ownership of directories or files, consider using ACLs.<\/p>\n<p><\/p>\n<p>Install <code>acl<\/code> if it\u2019s not available:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt install acl<\/code><\/pre>\n<p><\/p>\n<p>Then, set permissions for the <code>sysusers<\/code> group:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo setfacl -m g:sysusers:rx \/sys\/class<\/code><\/pre>\n<p><\/p>\n<p>This command will restrict the group <code>sysusers<\/code> to read and execute permissions on the <code>\/sys\/class<\/code> directory.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Restrict Writes<\/strong>: In general, restrict write access more strictly. You might set default permissions that are read-only for non-root users:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo chmod o-w \/sys<\/code><\/pre>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Step 5: Monitor Access<\/h3>\n<p><\/p>\n<p>Once you&#8217;ve made changes, continuously monitor access to <code>\/sys<\/code> using tools such as <code>auditd<\/code>. Install <code>auditd<\/code> if it\u2019s not already set up:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt install auditd<\/code><\/pre>\n<p><\/p>\n<p>Configure it to track access to <code>\/sys<\/code>:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo auditctl -w \/sys -p rwxa<\/code><\/pre>\n<p><\/p>\n<p>This will log all read, write, execute, and attribute changes to the <code>\/sys<\/code> filesystem.<\/p>\n<p><\/p>\n<h3>Step 6: Regular Reviews and Penetration Testing<\/h3>\n<p><\/p>\n<p>The final step in securing your Linux server involves periodic reviews. Conduct regular audits to check for unauthorized changes in permissions and ensure that the intended access restrictions remain in place. If necessary, perform penetration testing to identify any potential vulnerabilities that could be exploited by non-root users.<\/p>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Securing your Linux server by limiting access to sensitive areas like <code>\/sys<\/code> is a crucial aspect of maintaining a robust security posture. By reviewing current permissions, creating user groups, modifying access controls, and implementing monitoring, you can significantly reduce the risk posed by unauthorized access.<\/p>\n<p><\/p>\n<p>Remember that maintaining security is an ongoing process. Regularly update your security protocols and stay informed about potential vulnerabilities in the Linux ecosystem. By taking these proactive steps, you can help protect your Linux server and its valuable data from malicious attackers.<\/p>\n<p><\/p>\n<p>For more articles and tips on securing your Linux server, stay connected with WafaTech Blog!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>Linux servers are a popular choice for hosting applications and services due to their stability, flexibility, and open-source nature. However, with great flexibility comes responsibility. As an administrator, you need to ensure that your systems are secure from potential security breaches and unauthorized access. One of the critical areas where permissions can be tightened is [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1776,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[273,1126,265,1132,264,266,1131,871],"class_list":["post-1775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-access","tag-limiting","tag-linux","tag-nonroot","tag-securing","tag-server","tag-sys","tag-users","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Your Linux Server: Limiting \/sys Access for Non-Root Users - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users\" \/>\n<meta property=\"og:description\" content=\"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-11T19:52:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Securing Your Linux Server: Limiting \\\/sys Access for Non-Root Users\",\"datePublished\":\"2025-03-11T19:52:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/\"},\"wordCount\":679,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png\",\"keywords\":[\"Access\",\"Limiting\",\"Linux\",\"NonRoot\",\"Securing\",\"Server\",\"sys\",\"Users\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/\",\"name\":\"Securing Your Linux Server: Limiting \\\/sys Access for Non-Root Users - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png\",\"datePublished\":\"2025-03-11T19:52:01+00:00\",\"description\":\"Securing Your Linux Server: Limiting \\\/sys Access for Non-Root Users %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server limiting \\\/sys access for non-root users\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-your-linux-server-limiting-sys-access-for-non-root-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Your Linux Server: Limiting \\\/sys Access for Non-Root Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users - WafaTech Blogs","description":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/","og_locale":"en_US","og_type":"article","og_title":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users","og_description":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-03-11T19:52:01+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users","datePublished":"2025-03-11T19:52:01+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/"},"wordCount":679,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/03\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png","keywords":["Access","Limiting","Linux","NonRoot","Securing","Server","sys","Users"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/","name":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/03\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png","datePublished":"2025-03-11T19:52:01+00:00","description":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/03\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/03\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png","width":1024,"height":1024,"caption":"linux server limiting \/sys access for non-root users"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-your-linux-server-limiting-sys-access-for-non-root-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Your Linux Server: Limiting \/sys Access for Non-Root Users"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/03\/Securing-Your-Linux-Server-Limiting-sys-Access-for-Non-Root-Users.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/1775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=1775"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/1775\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/1776"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=1775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=1775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=1775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}