Restrict: All other non-essential ports should be blocked.
HTTPS Enforcement: A valid SSL/TLS certificate (e.g., from Let's Encrypt) must be installed to enable HTTPS. All HTTP traffic should be automatically redirected to HTTPS.
👤 Access Control
SSH Key Authentication: Password-based SSH login must be disabled. Access should be granted only through public key authentication.
Root Login: Direct root login via SSH must be disabled. Administrative tasks should be performed via a non-root user with sudo privileges.