Compute Instance Security

Make sure that your compute instances are secure, and control access to them. We recommend using key-based SSH to access your compute instances. Password-based SSH could be susceptible to brute-forcing attacks, and is not recommended.

Use the following checklist to protect your compute instances:

Done? Security Controls and Recommendations
Check box Apply the latest operating system patches.

Use the OS management service to manage updates and patches for the operating system environment of your compute instances. See OS Management.

Check box Manage SSH keys and their rotation.
Check box Disable password login.
Check box Disable root login.
Check box Change the SSH port to a nonstandard port.
Check box Harden the operating system of your compute instances.
Check box Use host-based intrusion detection and prevention systems (IDS and IPS).
Check box Use host-based firewalls, such as iptables, to restrict network access to instances including ports, protocols, and packet types.
Check box Apply the latest security patches for applications.
Check box Limit instance metadata access to only privileged users on the instance. For example, iptables can be used to restrict instance metadata access to only privileged users, such as root.
Check box Use instance principals and dynamic groups.

The following graphic illustrates how you can designate compute instances as instance principals, to enable the instances to make API calls to Oracle Cloud Infrastructure services. This example shows a dynamic group consisting of three compute instances. An IAM policy is defined to authorize the dynamic group to send Oracle Cloud Infrastructure API requests.