Hop Docs
search
⌘Ctrlk
User Docs
Hop Docs
  • Welcome
  • JavaScript SDK
    • Welcome
    • Getting started
    • API Reference
  • API
    • API Endpoints
  • Hop Node
    • Running a Hop Bonder
    • Bonder Options
    • Resources and Best Practices
      • Securing Cloud Instance
      • Additional Security & Node Best Practices
      • Additional questions
  • Subgraphs
    • Welcome
    • Entities
    • Queries
    • Subgraph Info
  • Smart Contracts
    • Welcome
    • Integration
    • Contract Addresses
  • Fees
    • Fee Calculation
  • RPC
    • RPC Endpoints
  • Other
    • Assets
    • On the web
    • FAQ
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Hop Nodechevron-right
  2. Resources and Best Practices

Securing Cloud Instance

These are recommendations for securing Cloud instances and deployments

hashtag
AWS

hashtag
Limit access

Use IAM roles and policies to limit what users and services can access on instance

LogoIdentity-based policies for Amazon EC2 - Amazon Elastic Compute CloudAmazon Elastic Compute Cloudchevron-right

hashtag
Use SSM for SSH connections

LogoStep 8: (Optional) Allow and control permissions for SSH connections through Session Manager - AWS Systems ManagerAWS Systems Managerchevron-right

hashtag
EC2 best practices

LogoBest practices for Amazon EC2 - Amazon Elastic Compute CloudAmazon Elastic Compute Cloudchevron-right

hashtag
GCP

hashtag
Best practices

LogoCloud Security Best Practices Center | Google CloudGoogle Cloudchevron-right

Last updated 2 years ago

  • AWS
  • GCP