In this article, we will go through all necessary SSH configurations that can be used to secure our ECS instances in a production environment.