Hop Docs
Developer Docs
User Docs
Search…
⌃K
Links
Developer Docs
Welcome
JavaScript SDK
Welcome
Getting started
API Reference
API
API Endpoints
Hop Node
Welcome
Getting started
Requirements
Configuration
Keystore
Staking
Installing Docker
Docker image
Running Docker container
Monitoring
EC2 Setup
Docker CloudWatch Logs
Prometheus Monitoring
AWS Parameter Store Setup
Running in Production
Securing Cloud Instance
Securing Server
SSH 2FA
Additional Security & Node Best Practices
CLI Commands
Contract State
Additional questions
Subgraphs
Welcome
Entities
Queries
Subgraph Info
Smart Contracts
Welcome
Integration
Contract Addresses
Fees
Fee Calculation
RPC
RPC Endpoints
Other
Assets
On the web
FAQ
Powered By
GitBook
Securing Cloud Instance
These are recommendations for securing Cloud instances and deployments
AWS
Limit access
Use IAM roles and policies to limit what users and services can access on instance
IAM policies for Amazon EC2 - Amazon Elastic Compute Cloud
Amazon Elastic Compute Cloud
Use SSM for SSH connections
Step 8: (Optional) Enabling and controlling permissions for SSH connections through Session Manager - AWS Systems Manager
AWS Systems Manager
EC2 best practices
Best practices for Amazon EC2 - Amazon Elastic Compute Cloud
Amazon Elastic Compute Cloud
GCP
Best practices
Cloud Security Best Practices Center | Google Cloud
Google Cloud
Hop Node - Previous
Running in Production
Next - Hop Node
Securing Server
Last modified
6mo ago