Security Overview

This topic is intended for people who are currently using Eucalyptus and who want to harden the cloud and underlying configuration.

This topic covers available controls and best practices for securing your Eucalyptus cloud. Cloud security depends on security across many layers of infrastructure and technology:

Tip: For information about securing applications in AWS cloud, we recommend the Amazon Web Services AWS Security Best Practices whitepaper. The practices in this in this paper also apply to your Eucalyptus cloud.