Hosts
This topic describes best practices for machines that host a Eucalyptus component.
Networking Modes
This topic describes the recommendations for networking modes.
Images and Instances
Because all instances are based on images, creating a secure image helps to create secure instances. This topic lists best practices that will add additional security during image creation. As a general rule, harden your images similar to how you would harden your physical servers.
Management Console
This topic describes things you can do to secure the Eucalyptus Management Console.
LDAP Security
This topic explains variables in the LIC file you should use to secure configuration.