It is important to configure these defenses to protect
from attacks by both
outsiders and insiders.
- Firewalls: Limit network access to the machine that runs
.
- Accounts: Limit login access to the machine that runs
. Centrally administer
accounts using, for instance, an LDAP server.
- Physical locks: Limit physical access to the machine that runs
.
- Secure traffic: Encrypt the traffic that flows on your internal
network.
- File permissions: Restrict the file permissions granted to the
account that launches
.
- Quotas: Limit the file space and CPU that an account can
consume.