Difference between revisions of "Security Practices"

From CAC Documentation wiki
Jump to navigation Jump to search
(Changed formatting)
(Changed formatting)
Line 5: Line 5:
 
== Recommended Key-Pair Security Practices ==
 
== Recommended Key-Pair Security Practices ==
  
The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are at [[OpenStack_Key_Pairs_Test#Creating_a_Password-Protected_Key_Pair_(Recommended)]].  
+
The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are [[OpenStack_Key_Pairs_Test#Creating_a_Password-Protected_Key_Pair_(Recommended)|here]].  
  
You can also create a key-pair using the OpenStack GUI, and the instructions are found here: [[OpenStack_Key_Pairs#Creating_a_Key_Pair_(using_OpenStack)]]
+
You can also create a key-pair using the OpenStack GUI, and the instructions are found [[OpenStack_Key_Pairs#Creating_a_Key_Pair_(using_OpenStack)|here]].
  
 
== Recommended Security Group Practices ==
 
== Recommended Security Group Practices ==

Revision as of 17:47, 29 January 2021

There are different ways to provide security to your Red Cloud instances. The two main steps that go into creating an instance are key-pair and security group creation. By modifying these two steps you can provide greater security to your instance. In this webpage, we will go over recommended security practices for your purposes.

Recommended Key-Pair Security Practices

The recommended way to use key pairs is through a password-protected key pair. The instructions to do so are here.

You can also create a key-pair using the OpenStack GUI, and the instructions are found here.

Recommended Security Group Practices

Recommended CIDR Specifications

Other Security Options