Good Practice Recommendations for Configuring OpenSSH Server

We recommend the following guidelines to secure OpenSSH configuration against the most common remote exploits:

  • Disable remote root user logins over SSH.

  • After you have correctly configured key based authentication, disable SSH password authentication.

  • Consider setting a non standard SSH port for Internet-facing systems.

For more information, see Restricting Access to SSH Connections.