Hop
Search…
Hop
Welcome
JS SDK
Hop Node
Getting started
Requirements
Configuration
Keystore
Staking
Installing Docker
Docker image
Running Docker container
EC2 Setup
Monitoring
Docker CloudWatch Logs
Prometheus Monitoring
AWS Parameter Store Setup
Running in Production
Securing Cloud Instance
Securing Server
SSH 2FA
Additional Security & Node Best Practices
CLI Commands
Contract State
Additional questions
TheGraph Subgraphs
Contract Addresses
Smart Contracts
RPC Endpoints
Fee Calculation
On the web
FAQ
Assets
Powered By
GitBook
Securing Cloud Instance
These are recommendations for securing Cloud instances and deployments
AWS
Limit access
Use IAM roles and policies to limit what users and services can access on instance
IAM policies for Amazon EC2 - Amazon Elastic Compute Cloud
Amazon Elastic Compute Cloud
Use SSM for SSH connections
Step 8: (Optional) Enabling and controlling permissions for SSH connections through Session Manager - AWS Systems Manager
AWS Systems Manager
EC2 best practices
Best practices for Amazon EC2 - Amazon Elastic Compute Cloud
Amazon Elastic Compute Cloud
GCP
Best practices
Cloud Security Best Practices Center | Google Cloud
Google Cloud
Previous
Running in Production
Next
Securing Server
Last modified
8mo ago
Copy link
Contents
AWS
GCP