Port 22

Implementing a Zero Trust strategy after compromise recovery