Controlling SSH for Security and Compliance