Secure Login and Access

Securing access to your servers is critical because it is the first line of defence against unauthorised access and potential breaches. Most security incidents are caused by inadequate access controls, such as weak or default passwords, stolen credentials, and lack of...

Logging guidelines

Based on EGI Security Traceability and Logging Policy all certified EGI sites need to have a remote logging service in place. By storing logs remotely, you protect them from being tampered with or deleted by attackers who gain access to your systems. This ensures the...