Hello,
I see all of you talking about SSH, private keys, open-closed ports, 2FactorAuth.
Most of you are missing key aspects you don't find by running Google searches: a server is as secured as its weakest chain.
Should you need a security audit done by a system engineer, feel free to contact...