In the previous chapter, you learned how to use the event system and the reactor in Salt to make a reactive, dynamic, and auto-healing infrastructure.
In this chapter, you will learn best practices to secure your Salt infrastructure. You will learn the following topics:
The default Salt configuration values are designed to be pretty secure. However, sometimes, new users to Salt change configuration values for convenience, which could have an adverse effect on the security of your infrastructure.
Salt provides the ability to bypass certain authentication protocols ...