Skip to main content

Reduce Attack Surface

Ultimate guide to securing SSH

SSH is a popular tool for remotely managing Servers and networking equipment, it’s;s installed and enabled by default on every single Linux/BSD-based server. Since SSH is so widely used in many environments, it has become an obvious and easy target for many threat actors. If something goes wrong with SSH, things can go wrong quickly, making it an especially valuable target. Required Knowledge # Linux Fundamentals Networking fundamentals Testing and backups # Before making any configuration changes to your Server, you should first test these changes in a testing environment. If all goes well, backup your production server and then apply your changes.