Skip to content

Security Measures

Several security practices were implemented during the initial server configuration to enhance the security posture of the deployment environment including setting up a firewall. ANother notable measure was disabling password-based login via SSH entirely. Access to the server is enforced exclusively through SSH key authentication. This significantly reduces the risk of brute-force attacks targeting SSH login credentials.