https://www.sans.org/reading-room/whitepapers/protocols/securing-ssh-cis-critical-security-controls-36462