3. SSH Hardening
- Change the default SSH port
- Disable password authentication (use key-based authentication)
- Limit SSH access to specific IP addresses or ranges
- Use SSH protocol version 2
- Configure SSH idle timeout
Important: Always keep a backup method of access when making SSH changes!