Basic Security Considerations
Environment
- Use WIFI in public areas with caution (such as hotels, coffee shops, etc.)
 - Avoid using unencrypted wireless networks
 
Personnel
- Need to have professional ability to organize operation and maintenance implementation
 - Need to be familiar with technology, understand process, follow norms
 - Unrelated personnel are prohibited from accessing important network information
 
Facilities
- Choose cloud services from major international companies (AWS Global, Google Cloud, MS Azure, etc.)
 - Subscription to commercial support services to receive technical support as quickly as possible
 - Choose an international geographical area to place facilities in order to obtain good connectivity with the main network
 - Add 2FA login to avoid cloud service account hacking
 - Treat API keys with caution, if there is no need for automation, prohibit or do not generate apikey
 - Use special equipment to operate the facility
 
Communication
- Sign and encrypt communication
 - Do not open emails from unknown sources
 - Avoid transmitting private keys over public networks
 
Login
- Log in to the server using a certificate or a proxy solution (AWS Systems Manager)
 - It is forbidden to log in to the server facility with username and password
 - Lock the IP, only the specific authorized IP can log in to the server facility
 - Eliminate unnecessary network-wide authorization (0.0.0.0/0)
 
System
- Timely patch the operating system
 - The server uses a new version of the kernel (4.4+)
 
Ports
- Do not open unnecessary ports
 - Disable RPC port
 
Version
- Obtain the software version from official channels
 - Before installing or running the software, check the version source and verify the content
 
Service
- Enable advanced protection (AWS Shield, Cloudflare, Incapsula, etc.)
 - Enable TLS
 - Enable WAF
 - Prohibit starting node services as privileged users
 - Configure the number of P2P single IP node connections
 - Configure P2P with timeout mechanism
 
Logs
- Recording (such as AWS FlowLog) and analyzing network logs
 - Record node log
 
Backup
- Make an offline cold backup of the private key