This is not the forum for security ... but ... addressing the point raised by Wernfried Domscheit, you should consider modifying the file ... /etc/security/access.conf ... to suit your unique circumstances. The below is a modified version of my own file for public consumption.
### Permit root login from local ### Look at /etc/hosts for host IP aliases
+:root:LOCAL localhost myHost
#
### Permit designated users to access from local
+:username:LOCAL localhost myHost
#
### Permit all local services/users to access from local
#+:ALL:LOCAL localhost myHost
+:ALL:LOCAL ALL
#
### Deny access to all from any remote (must be last)
-:ALL:ALL
Similarly for ... /etc/ssh/ssh_config ...
### Group 1 - Restrictive
PermitRootLogin no ## myHost
ForwardAgent no ## myHost
ForwardX11 no ## myHost
ForwardX11Trusted no ## myHost
DenyUsers root ## myHost
DenyGroups root ## myHost
### Group 2 - Permissive
AllowUsers nonexistent ## myHost
AllowGroups nonexistent ## myHost
### Deploy any modifications using: systemctl restart sshd
Those give you a rock-bottom minimum for controlling access from outside. If access is being attempted from inside, you have an entirely different problem.