Security Practices

From CAC Documentation wiki
Jump to navigation Jump to search

There are different ways to provide security to your Red Cloud instances. The two main steps that go into creating an instance are key pair and security group creation. By modifying these two steps you can provide greater security to your instance. On this page, we will go over recommended security practices for your purposes.

Recommended Key Pair Security Practices

The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are here.

You can also create a key pair using the OpenStack GUI, and the instructions are found here.

Recommended Security Group Practices

Recommended CIDR Specifications

Other Security Options