For additional safety your authorized_keys file can also be setup to only settle for connections from selected IP addresses or hostnames. Environment that up is beyond the scope of the tutorial, but more details on the SSH authorized_keys file are available at SSH Academy: Configuring authorized_keys for OpenSSH. Many https://createssh.org/