This is an updated version from last year. Thank you for the great feedback!
This article covers mainly the configuration of the SSH service and only references ways to protect the service on the hos
I am happy to share my revised SSH server hardening guide.
Typos… authentification -> authentication