These are really not overly complicated, but are well worth doing for any hardware server, or server you have hosted remotely somewhere on a VPS hosting. It’s nothing very fancy but should prevent most of the common exploits that try login into the server via SSH.
What remains of course is any applications (and their 3rd party plugins) that you’re running on that server, and which are exposed to the Internet, but that is often specific to the application (or the use of something like Nginx Proxy Manager).