{"id":2895,"date":"2025-06-28T21:14:49","date_gmt":"2025-06-28T18:14:49","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/"},"modified":"2025-06-28T21:14:49","modified_gmt":"2025-06-28T18:14:49","slug":"securing-home-directories-on-linux-servers-with-restrictive-permissions","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/","title":{"rendered":"Securing Home Directories on Linux Servers with Restrictive Permissions"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today&#8217;s digital landscape, securing sensitive data is paramount, especially in shared environments like Linux servers. One critical aspect of this security is managing the permissions of home directories. This article will guide you through the best practices for securing home directories on Linux servers, emphasizing the importance of restrictive permissions.<\/p>\n<p><\/p>\n<h2>Understanding Home Directories<\/h2>\n<p><\/p>\n<p>On a Linux system, each user has a dedicated home directory, typically located at <code>\/home\/username<\/code>. These directories store personal files, configurations, and user-specific data, making them vital for both the user and the overall system security.<\/p>\n<p><\/p>\n<h2>Why Restrict Permissions?<\/h2>\n<p><\/p>\n<p>Setting strict permissions on home directories is essential for the following reasons:<\/p>\n<p><\/p>\n<ol><\/p>\n<li><strong>Data Privacy<\/strong>: Users shouldn\u2019t have unauthorized access to each other&#8217;s files.<\/li>\n<p><\/p>\n<li><strong>Malware Protection<\/strong>: Restricting access can help contain the spread of malware.<\/li>\n<p><\/p>\n<li><strong>System Integrity<\/strong>: Preventing unauthorized modifications can keep system configurations in check.<\/li>\n<p><\/p>\n<li><strong>Compliance<\/strong>: Many regulations require data privacy measures.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Default Permissions and Their Risks<\/h2>\n<p><\/p>\n<p>By default, a newly created home directory typically has permissions set to <code>755<\/code>, allowing others on the system to read and execute files. This default can be especially risky in multi-user environments. The command to check permissions is:<\/p>\n<p><\/p>\n<p>bash<br \/>\nls -ld \/home\/username<\/p>\n<p><\/p>\n<p>For a secure setup, the recommended permission setting for home directories is <code>700<\/code>, which allows only the user to read, write, and execute.<\/p>\n<p><\/p>\n<h2>Setting Restrictive Permissions<\/h2>\n<p><\/p>\n<p>To change the permissions on a home directory, use the <code>chmod<\/code> command. For example, to set the permissions to <code>700<\/code>, you would run:<\/p>\n<p><\/p>\n<p>bash<br \/>\nchmod 700 \/home\/username<\/p>\n<p><\/p>\n<h3>Verify and Adjust Permissions for Existing Users<\/h3>\n<p><\/p>\n<p>After setting the baseline for new users, ensure that existing users have the correct permissions. You can do this with the following script:<\/p>\n<p><\/p>\n<p>bash<\/p>\n<p>for user in $(cut -f1 -d: \/etc\/passwd); do<br \/>\ndir=&quot;\/home\/$user&quot;<br \/>\nif [ -d &quot;$dir&quot; ]; then<br \/>\nchmod 700 &quot;$dir&quot;<br \/>\necho &quot;Permissions for $dir set to 700&quot;<br \/>\nfi<br \/>\ndone<\/p>\n<p><\/p>\n<h3>Special Cases: Shared Directories<\/h3>\n<p><\/p>\n<p>In some situations, users might need to share files. In such instances, consider creating a specific shared group and setting the home directory permissions accordingly. For example:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p>Create a shared group:<br \/>\nbash<br \/>\ngroupadd sharedgroup<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p>Add users to the group:<br \/>\nbash<br \/>\nusermod -aG sharedgroup username<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>Set directory permissions, allowing group members to access it:<br \/>\nbash<br \/>\nchmod 770 \/path\/to\/shareddirectory<br \/>\nchown :sharedgroup \/path\/to\/shareddirectory<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Implementing Access Control Lists (ACLs)<\/h3>\n<p><\/p>\n<p>For more granular control, consider using Access Control Lists (ACLs). This allows you to specify permissions for individual users and groups on a file-by-file basis. To enable ACL on a filesystem, first ensure that it\u2019s mounted with ACL support:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p>Check your current mounts:<br \/>\nbash<br \/>\nmount | grep acl<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p>If not mounted, you can remount with ACL support:<br \/>\nbash<br \/>\nmount -o remount,acl \/<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>Use <code>setfacl<\/code> to set specific permissions:<br \/>\nbash<br \/>\nsetfacl -m u:username:rwx \/path\/to\/directory<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Regular Audits and Monitoring<\/h2>\n<p><\/p>\n<p>A proactive approach to security includes regular audits of user permissions. You can schedule a cron job to periodically review permissions:<\/p>\n<p><\/p>\n<p>bash<br \/>\n0 0 <em> <\/em> * root find \/home -type d ! -perm 700 -exec chmod 700 {} \\;<\/p>\n<p><\/p>\n<p>This cron job runs daily at midnight and ensures all directories under <code>\/home<\/code> revert to <code>700<\/code> permissions if altered.<\/p>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Securing home directories on Linux servers is a crucial step toward enhancing overall system security. By applying restrictive permissions, utilizing group settings for shared resources, and implementing ACLs where necessary, you can significantly mitigate risks associated with unauthorized access. Regular audits and monitoring will help maintain these security measures, ensuring a safe environment for all users.<\/p>\n<p><\/p>\n<p>Combine these strategies with good security practices, such as using strong passwords and regularly updating systems, and you will be well on your way to a fortified Linux server environment.<\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<p>By following these guidelines, you can ensure that your Linux server&#8217;s home directories are secure, protecting sensitive information and maintaining the integrity of your system.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s digital landscape, securing sensitive data is paramount, especially in shared environments like Linux servers. One critical aspect of this security is managing the permissions of home directories. This article will guide you through the best practices for securing home directories on Linux servers, emphasizing the importance of restrictive permissions. Understanding Home Directories On [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2896,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[1553,1552,265,654,1138,264,302],"class_list":["post-2895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-directories","tag-home","tag-linux","tag-permissions","tag-restrictive","tag-securing","tag-servers","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing Home Directories on Linux Servers with Restrictive Permissions - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Securing Home Directories on Linux Servers with Restrictive Permissions %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Home Directories on Linux Servers with Restrictive Permissions\" \/>\n<meta property=\"og:description\" content=\"Securing Home Directories on Linux Servers with Restrictive Permissions %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-28T18:14:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Securing Home Directories on Linux Servers with Restrictive Permissions\",\"datePublished\":\"2025-06-28T18:14:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/\"},\"wordCount\":632,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png\",\"keywords\":[\"Directories\",\"Home\",\"Linux\",\"Permissions\",\"Restrictive\",\"Securing\",\"Servers\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/\",\"name\":\"Securing Home Directories on Linux Servers with Restrictive Permissions - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png\",\"datePublished\":\"2025-06-28T18:14:49+00:00\",\"description\":\"Securing Home Directories on Linux Servers with Restrictive Permissions %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server securing home directories with restrictive permissions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/securing-home-directories-on-linux-servers-with-restrictive-permissions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Home Directories on Linux Servers with Restrictive Permissions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing Home Directories on Linux Servers with Restrictive Permissions - WafaTech Blogs","description":"Securing Home Directories on Linux Servers with Restrictive Permissions %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/","og_locale":"en_US","og_type":"article","og_title":"Securing Home Directories on Linux Servers with Restrictive Permissions","og_description":"Securing Home Directories on Linux Servers with Restrictive Permissions %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-06-28T18:14:49+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Securing Home Directories on Linux Servers with Restrictive Permissions","datePublished":"2025-06-28T18:14:49+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/"},"wordCount":632,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png","keywords":["Directories","Home","Linux","Permissions","Restrictive","Securing","Servers"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/","name":"Securing Home Directories on Linux Servers with Restrictive Permissions - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png","datePublished":"2025-06-28T18:14:49+00:00","description":"Securing Home Directories on Linux Servers with Restrictive Permissions %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png","width":1024,"height":1024,"caption":"linux server securing home directories with restrictive permissions"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/securing-home-directories-on-linux-servers-with-restrictive-permissions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing Home Directories on Linux Servers with Restrictive Permissions"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/06\/Securing-Home-Directories-on-Linux-Servers-with-Restrictive-Permissions.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=2895"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/2895\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/2896"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=2895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=2895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=2895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}