Difference between revisions of "Security Practices"
Jump to navigation
Jump to search
m (Added links) |
|||
Line 5: | Line 5: | ||
== Recommended Key Pair Security Practices == | == Recommended Key Pair Security Practices == | ||
− | The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are [[ | + | The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are [[OpenStack_Key_Pairs#Create a Passphrase-Protected Key Pair|here]]. |
− | You can also create a key pair using the OpenStack GUI, and the instructions are found [[OpenStack_Key_Pairs# | + | You can also create a key pair using the OpenStack GUI, and the instructions are found [[OpenStack_Key_Pairs#Create a Key Pair Without a Passphrase (with OpenStack)|here]]. |
== Recommended Security Group Practices == | == Recommended Security Group Practices == |
Latest revision as of 09:48, 15 October 2021
There are different ways to provide security to your Red Cloud instances. The two main steps that go into creating an instance are key pair and security group creation. By modifying these two steps you can provide greater security to your instance. On this page, we will go over recommended security practices for your purposes.
Recommended Key Pair Security Practices
The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are here.
You can also create a key pair using the OpenStack GUI, and the instructions are found here.