don't host anything crypto related, setup ssh with public key auth using a strong passphrase, restrict access via vpn / only expose the required ports via firewall, ensure your services don't report version numbers to avoid fingerprinting, be cognizant of the software running on the box so if/when the next log4j happens, you're able to react accordingly.
4oo4|4 years ago
I would also add that containers are great too, so if something does get exploited that it limits the damage a single exploited app can cause.
boxingrock|4 years ago