{"id":3484,"date":"2025-08-28T17:32:52","date_gmt":"2025-08-28T14:32:52","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/"},"modified":"2025-08-28T17:32:52","modified_gmt":"2025-08-28T14:32:52","slug":"mastering-git-security-setting-strict-permissions-on-linux-servers","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/","title":{"rendered":"Mastering Git Security: Setting Strict Permissions on Linux Servers"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today\u2019s fast-paced development environment, Git has become a cornerstone for version control systems. While it provides immense benefits for collaboration and code management, it also introduces potential security risks if not properly configured. This article aims to help you master Git security by setting strict permissions on Linux servers, ensuring your codebase remains safe from unauthorized access.<\/p>\n<p><\/p>\n<h2>Understanding Git Repositories<\/h2>\n<p><\/p>\n<p>Before diving into security measures, it&#8217;s crucial to understand what Git repositories are and how sensitive the data can be. Git repositories often store not just the codebase, but also sensitive information such as API keys, passwords, and proprietary algorithms.<\/p>\n<p><\/p>\n<h3>Why Security Matters<\/h3>\n<p><\/p>\n<ul><\/p>\n<li><strong>Data Integrity<\/strong>: Unauthorized changes can lead to significant issues.<\/li>\n<p><\/p>\n<li><strong>Exposure of Sensitive Information<\/strong>: Even a single compromised repository can lead to data breaches.<\/li>\n<p><\/p>\n<li><strong>Compliance<\/strong>: Many industries have regulations that require strict access control.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h2>Setting Up Git on Linux<\/h2>\n<p><\/p>\n<p>To get started, you\u2019ll need a Linux server where Git is installed. Follow these steps if you haven\u2019t configured Git yet:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Install Git<\/strong>:<br \/>\nbash<br \/>\nsudo apt update<br \/>\nsudo apt install git<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Create Your Git Repository<\/strong>:<br \/>\nbash<br \/>\nmkdir \/srv\/git\/myproject.git<br \/>\ncd \/srv\/git\/myproject.git<br \/>\ngit init &#8211;bare<\/p>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Configuring User Permissions<\/h2>\n<p><\/p>\n<h3>Step 1: Create a Group for Git Users<\/h3>\n<p><\/p>\n<p>Create a dedicated group for all users who require access to the Git repository:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo groupadd gitusers<\/p>\n<p><\/p>\n<h3>Step 2: Add Users to the Group<\/h3>\n<p><\/p>\n<p>Add users to the newly created group:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo usermod -aG gitusers username<\/p>\n<p><\/p>\n<p>Repeat this step for all users needing access.<\/p>\n<p><\/p>\n<h3>Step 3: Set Ownership and Permissions<\/h3>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Set Group Ownership<\/strong>:<br \/>\nChange the group ownership of the Git repository:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo chown -R :gitusers \/srv\/git\/myproject.git<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Set Permissions<\/strong>:<br \/>\nNow, you want to ensure that only the group members can read, write, and execute:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo chmod -R 770 \/srv\/git\/myproject.git<\/p>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Step 4: Set the Setgid Bit<\/h3>\n<p><\/p>\n<p>By setting the setgid (Set Group ID) bit on the directory, newly created files will inherit the group of the parent directory instead of the user&#8217;s primary group:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo chmod g+s \/srv\/git\/myproject.git<\/p>\n<p><\/p>\n<h2>Managing SSH Access<\/h2>\n<p><\/p>\n<p>For secure access to the Git repository, set up SSH key authentication:<\/p>\n<p><\/p>\n<h3>Step 1: Generate SSH Keys<\/h3>\n<p><\/p>\n<p>In each user&#8217;s local machine:<\/p>\n<p><\/p>\n<p>bash<br \/>\nssh-keygen -t rsa -b 4096 -C &#8220;your_email@example.com&#8221;<\/p>\n<p><\/p>\n<h3>Step 2: Add SSH Keys to the Server<\/h3>\n<p><\/p>\n<p>Each user should add their public keys to the <code>~\/.ssh\/authorized_keys<\/code> file on the server:<\/p>\n<p><\/p>\n<p>bash<br \/>\ncat ~\/.ssh\/id_rsa.pub | ssh user@your_server &#8216;cat &gt;&gt; ~\/.ssh\/authorized_keys&#8217;<\/p>\n<p><\/p>\n<h3>Step 3: Configure SSH Daemon<\/h3>\n<p><\/p>\n<p>Ensure your <code>sshd_config<\/code> file enforces strict key requirements:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo nano \/etc\/ssh\/sshd_config<\/p>\n<p><\/p>\n<p>Ensure the following settings are included or uncommented:<\/p>\n<p><\/p>\n<p>plaintext<br \/>\nPermitRootLogin no<br \/>\nPasswordAuthentication no<br \/>\nChallengeResponseAuthentication no<\/p>\n<p><\/p>\n<h3>Step 4: Restart SSH Service<\/h3>\n<p><\/p>\n<p>To apply changes, restart the SSH service:<\/p>\n<p><\/p>\n<p>bash<br \/>\nsudo systemctl restart ssh<\/p>\n<p><\/p>\n<h2>Regular Housekeeping<\/h2>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Audit User Access<\/strong>:<br \/>\nRegularly review which users have access to the Git repository and revoke access when not needed.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Maintain Backup<\/strong>:<br \/>\nImplement a regular backup strategy for your repositories to ensure you can recover from potential data losses.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Monitor Repository Activity<\/strong>:<br \/>\nUse Git hooks or monitoring tools to track commits and changes, alerting you to any unwanted modifications.<\/p>\n<p>\n<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Mastering Git security is not a one-time task but an ongoing process. Setting strict permissions and managing user access on your Linux server is the first step in safeguarding your repositories. By following best practices around access control and authentication, you can significantly mitigate the risks associated with code sharing and collaboration. <\/p>\n<p><\/p>\n<p>By implementing these measures, you ensure not only the integrity of your codebase but also the trustworthiness of your development workflows. Git security is paramount, and as developers and information technology professionals, it&#8217;s our responsibility to uphold these standards. <\/p>\n<p><\/p>\n<p>Stay secure, and Happy Gitting!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s fast-paced development environment, Git has become a cornerstone for version control systems. While it provides immense benefits for collaboration and code management, it also introduces potential security risks if not properly configured. This article aims to help you master Git security by setting strict permissions on Linux servers, ensuring your codebase remains safe [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3485,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[1719,265,200,654,291,302,371,702],"class_list":["post-3484","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-git","tag-linux","tag-mastering","tag-permissions","tag-security","tag-servers","tag-setting","tag-strict","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mastering Git Security: Setting Strict Permissions on Linux Servers - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Mastering Git Security: Setting Strict Permissions on Linux Servers %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mastering Git Security: Setting Strict Permissions on Linux Servers\" \/>\n<meta property=\"og:description\" content=\"Mastering Git Security: Setting Strict Permissions on Linux Servers %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-28T14:32:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Mastering Git Security: Setting Strict Permissions on Linux Servers\",\"datePublished\":\"2025-08-28T14:32:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/\"},\"wordCount\":632,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png\",\"keywords\":[\"Git\",\"Linux\",\"Mastering\",\"Permissions\",\"Security\",\"Servers\",\"Setting\",\"Strict\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/\",\"name\":\"Mastering Git Security: Setting Strict Permissions on Linux Servers - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png\",\"datePublished\":\"2025-08-28T14:32:52+00:00\",\"description\":\"Mastering Git Security: Setting Strict Permissions on Linux Servers %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server securing Git repositories with strict permissions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/mastering-git-security-setting-strict-permissions-on-linux-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mastering Git Security: Setting Strict Permissions on Linux Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mastering Git Security: Setting Strict Permissions on Linux Servers - WafaTech Blogs","description":"Mastering Git Security: Setting Strict Permissions on Linux Servers %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/","og_locale":"en_US","og_type":"article","og_title":"Mastering Git Security: Setting Strict Permissions on Linux Servers","og_description":"Mastering Git Security: Setting Strict Permissions on Linux Servers %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-08-28T14:32:52+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Mastering Git Security: Setting Strict Permissions on Linux Servers","datePublished":"2025-08-28T14:32:52+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/"},"wordCount":632,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png","keywords":["Git","Linux","Mastering","Permissions","Security","Servers","Setting","Strict"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/","name":"Mastering Git Security: Setting Strict Permissions on Linux Servers - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png","datePublished":"2025-08-28T14:32:52+00:00","description":"Mastering Git Security: Setting Strict Permissions on Linux Servers %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png","width":1024,"height":1024,"caption":"linux server securing Git repositories with strict permissions"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/mastering-git-security-setting-strict-permissions-on-linux-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Mastering Git Security: Setting Strict Permissions on Linux Servers"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Mastering-Git-Security-Setting-Strict-Permissions-on-Linux-Servers.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/3484","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=3484"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/3484\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/3485"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=3484"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=3484"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=3484"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}