Chapter 9. Security Best Practices in Salt

In the previous chapter, you learned how to use the event system and the reactor in Salt to make a reactive, dynamic, and auto-healing infrastructure.

In this chapter, you will learn best practices to secure your Salt infrastructure. You will learn the following topics:

  • Security configuration options
  • Key management
  • Firewall and network configuration

Securing Salt configuration

The default Salt configuration values are designed to be pretty secure. However, sometimes, new users to Salt change configuration values for convenience, which could have an adverse effect on the security of your infrastructure.

Master configuration

open_mode and auto_accept

Salt provides the ability to bypass certain authentication protocols ...

Get Learning SaltStack - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.