Good Practice Recommendations for Configuring OpenSSH Server
We recommend the following guidelines to secure OpenSSH configuration against the most common remote exploits:
-
Disable remote root user logins over SSH.
-
After you have correctly configured key based authentication, disable SSH password authentication.
-
Consider setting a non standard SSH port for Internet-facing systems.
For more information, see Restricting Access to SSH Connections.