At Cloud-A we enable our users to signup and manage their own infrastructure, giving them full control to configure and secure their own instances, networks and storage as they wish. We like to provide tips, tricks and best practises to give you the information you need to ensure that your instances are secure. Here are a few best practises for hardening and securing your Linux instances on Cloud-A.
Eliminate Unneeded Service
Do not run any unneeded services such as FTP.
If you are running DNS, be sure to close it off from being an open resolver so that you do not become part of a DDoS attack.
Lock down SSH
Disable root login via SSH
Only allow specified IPs to connect via SSH
Only allow SSH Key based authentication – Do not allow password authentication