Chapter 9. Security Best Practices in Salt
In the previous chapter, you learned how to use the event system and the reactor in Salt to make a reactive, dynamic, and auto-healing infrastructure.
In this chapter, you will learn best practices to secure your Salt infrastructure. You will learn the following topics:
- Security configuration options
- Key management
- Firewall and network configuration
Securing Salt configuration
The default Salt configuration values are designed to be pretty secure. However, sometimes, new users to Salt change configuration values for convenience, which could have an adverse effect on the security of your infrastructure.
Master configuration
open_mode and auto_accept
Salt provides the ability to bypass certain authentication protocols ...
Get Learning SaltStack - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.