Security considerations when running a VM: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 12: Line 12:
* Avoid using packages from unknown sources.
* Avoid using packages from unknown sources.
* Use a recent image. For example, don't use Ubuntu 14.04 when Ubuntu 16.04 is available.
* Use a recent image. For example, don't use Ubuntu 14.04 when Ubuntu 16.04 is available.
* Do not allow password authentication for SSH. Use key authentication instead.
* Use [https://docs.computecanada.ca/wiki/SSH_Keys SSH key] authentication instead of passwords.
* Install [https://www.fail2ban.org fail2ban] to block brute-force attacks.
* Install [https://www.fail2ban.org fail2ban] to block brute-force attacks.


rsnt_translations
56,430

edits

Navigation menu