Security considerations when running a VM: Difference between revisions
Jump to navigation
Jump to search
Line 12: | Line 12: | ||
=Network security= | =Network security= | ||
* Limit who can access your service, avoid using '''0.0.0.0''' in the CIDR field of the security group form. | * Limit who can access your service, avoid using '''0.0.0.0''' in the CIDR field of the security group form. | ||
* do not bundles ranges of ports to allow access | |||
* Be careful when creating your security rules, consider the following | * Be careful when creating your security rules, consider the following | ||
** Most services aren't meant to be publicly accessible: | ** Most services aren't meant to be publicly accessible: |
Revision as of 15:23, 29 March 2017
On the cloud, you are responsible for the security of your VMs.
This document is not intended to be a complete guide but only to give you some basic guidelines on things your need to consider when creating a VM on the cloud.
Keeping the Operating System secured[edit]
- Apply security updates
- Avoid using packages from unknown sources
- use an updated image (ex: don't use Ubuntu 14.04 when ubuntu 16.04 avalaible, or cent
- Do not allow password authentication for SSH (key authentication by default)
- Install fail2ban to block authentication failure
Network security[edit]
- Limit who can access your service, avoid using 0.0.0.0 in the CIDR field of the security group form.
- do not bundles ranges of ports to allow access
- Be careful when creating your security rules, consider the following
- Most services aren't meant to be publicly accessible:
- mysql
- postgresql
- nosql
- RDP
- ... many, many others
- Some services are meant to be accessible from the internet to deliver a service
- Apache
- Nginx
- ... others
- Most services aren't meant to be publicly accessible:
- Configure your web server to use HTTPS instead of HTTP.
- In many case HTTP should only be used to redirect traffic to HTTPS.
- others:
- Do not try to run a mail server.