SSH Security Hardening Procedures

This section describes the security hardening procedures using Secure Socket Shell (SSH).