Recommended Security Best Practices
- 08 Sep 2023
- 1 Minute to read
- Print
- DarkLight
- PDF
Recommended Security Best Practices
- Updated on 08 Sep 2023
- 1 Minute to read
- Print
- DarkLight
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
About this Article
This article outlines recommendations on security-related best practices for VSP. These instructions are applicable for the VSP infrastructure components (such as CMS and Remote VRule Engine) in VM-based or cloud-based environments.
The recommended best practices are:
- Security of cloud/infrastructure where VSP services are running
- Disable API access and secret keys for all the cloud root and default accounts with superuser privileges
- Combine the cloud platform security features with the existing Infrastructure components
- Perform regular security assessments on the instances and patch the vulnerabilities regularly
- Use Bastion hosts to enforce control and visibility to instances where Virsec services are running
- Use Bastion hosts to enforce control and visibility to instances where Virsec services are running
- Disable services and protocols to authenticate users in clear text over the network insecurely or otherwise
- Security of instances where VSP services are running
- Avoid using shared accounts to provision and access instances where Virsec services are running
- Avoid exposing VSP services on public IP. If required, restrict access to instances from limited IP ranges using firewall rules
- Within local VPC/private networks, access to the Virsec services must be limited using the firewall rules
- Launch instances from trusted and validated images only
- Configure sshd to allow only public key authentication on instances where Virsec services are running
- Ensure that .pem/.ppk file on the user machine is password protected
- Rotate credentials to instances where Virsec services are running. Enforce complex passwords and a strong rotation policy
- Do not execute any other services on instances where VSP CMS and AE services running unless required by VSP
- Securing access to CMS
- Integrate with authentication services like LDAP or SAML to give users access to CMS
- Do not share accounts, instead create a named account on CMS with privileges assigned on a need-to-know basis using the RBAC feature on CMS
Was this article helpful?