Skip to main content

700

700 Permission Code**

Permission Code: 700 Owner Exclusive Full Access

700 grants full rights to the owner only, and blocks access for group and public.

rwx------

This is a **strict, owner-only permission mode commonly used for private scripts, SSH directories, or sensitive automation assets in a WordPress VPS environment. It removes all group and public access.

Technical Permission Structure

NoRoleBitsAccess
1Ownerrwx✓ full
2Group---✗ none
3Others---✗ none

Behavioral Summary

  • Only owner can read, write, execute
  • Group has no access whatsoever
  • Public has no access whatsoever
  • Directory becomes fully private to the site user

WordPress Use Cases

NoComponentUse Case
1.ssh/ directorySSH keys and configs
2Backup scriptsPrevent tampering or access
3Deployment automation foldersSecure CI/CD scripts
4Custom storage folders for secrets.env, private configs
5Private maintenance toolsmaintenance.sh

Not for general WP core directories on publicly serving sites.

When 700 Should NOT Be Used

NoLocationReason
1/wp-content/WP and web server need access
2/wp-admin/breaks PHP/OLS/Nginx access
3/wp-includes/prevents PHP read
4Uploads directoryimages cannot be read

In these cases, use standard modes like 755 (dirs) and 644 (files).

Correct Usage Patterns

SSH directory

chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_rsa

Private script folder

chmod -R 700 /opt/wp-scripts

Script file

chmod 700 deploy.sh

Private config folder

chmod 700 /var/www/secure-config/

Realistic WP Server Scenarios

Scenario: VPS with automated deploy service

Script protection:

/opt/wp-deploy/ = 700
deploy.sh = 700

Scenario: Private cron scripts

/root/cron-scripts = 700

Scenario: SSH and secrets

/root/.ssh = 700
/var/www/wpuser/.ssh = 700

Security Rationale

NoBenefitExplanation
1Isolates sensitive scriptsno other users can read/modify
2Prevents secret exposureSSH keys, env vars
3Limits privilege surfacesonly owner handles execution
4Complies with secure SSH standardsrequired for SSH access

Misuse Impact

If applied to WordPress public directories:

  • PHP cannot serve assets
  • Web server cannot read themes/plugins/uploads
  • Website will break immediately

Example wrong usage:

chmod -R 700 wp-content

Fix:

find wp-content -type d -exec chmod 755 {} ;
find wp-content -type f -exec chmod 644 {} ;

Exercise for Controlled Environment

  1. Create private script folder
  2. Restrict with 700
  3. Test behavior as owner vs other user

Commands:

mkdir /opt/testing-secure
chmod 700 /opt/testing-secure
touch /opt/testing-secure/test.sh
chmod 700 /opt/testing-secure/test.sh

Switch users and verify restricted access.

Key Takeaways

NoStatementValid
1700 gives only owner full access
2Used for private scripts, SSH, automation
3Not used for WordPress public directories
4Required for .ssh folder
5Breaks WP operation if applied to site dirs
6Excellent for sensitive file isolation

Summary sentence:

Use 700 for private directories/scripts; never for WordPress content directories serving the public.

Integrity Rules Set

For public WordPress sites:

Directories: 755
Files: 644
wp-config.php: 600
Never apply 700 to core or public WP paths

S