Hop Docs
User Docs
Developer Docs
Developer Docs
  • Welcome
  • JavaScript SDK
    • Welcome
    • Getting started
    • API Reference
  • API
    • API Endpoints
  • Hop Node
    • Running a Hop Bonder
      • Bonder Requirements
      • Choosing a Platform
        • EC2 Setup
      • Securing your Server
        • Add SSH 2FA
      • Installing the Bonder
        • Installing the Bonder with Docker (recommended)
      • Configuring the Bonder
        • Keystore
          • Keystore AWS Parameter Store (recommended)
          • Keystore Local Passphrase
        • Configuration
      • Testing the Bonder
      • Running the Bonder
        • Staking
        • Starting the Bonder
      • Next Steps
    • Bonder Options
      • CLI Commands
      • Keystore Options
      • AWS KMS Signer
      • Monitoring
        • Docker CloudWatch Logs
        • Prometheus
      • Running Docker Container Options
      • Contract State
    • Resources and Best Practices
      • Securing Cloud Instance
      • Additional Security & Node Best Practices
      • Additional questions
  • Subgraphs
    • Welcome
    • Entities
    • Queries
    • Subgraph Info
  • Smart Contracts
    • Welcome
    • Integration
    • Contract Addresses
  • Fees
    • Fee Calculation
  • RPC
    • RPC Endpoints
  • Other
    • Assets
    • On the web
    • FAQ
Powered by GitBook
On this page
  • AWS
  • GCP
Edit on GitHub
  1. Hop Node
  2. Resources and Best Practices

Securing Cloud Instance

Last updated 1 year ago

These are recommendations for securing Cloud instances and deployments

AWS

Limit access

Use IAM roles and policies to limit what users and services can access on instance

Use SSM for SSH connections

EC2 best practices

GCP

Best practices

IAM policies for Amazon EC2 - Amazon Elastic Compute CloudAmazon Elastic Compute Cloud
Logo
Step 8: (Optional) Enabling and controlling permissions for SSH connections through Session Manager - AWS Systems ManagerAWS Systems Manager
Best practices for Amazon EC2 - Amazon Elastic Compute CloudAmazon Elastic Compute Cloud
Cloud Security Best Practices Center  |  Google CloudGoogle Cloud
Logo
Logo
Logo