Security

Security best practices for node operators

Draft Documentation

This documentation is under development and may be incomplete or subject to change.

Security Overview

Operating a ComputeNet node requires careful attention to security. This guide covers best practices for securing your validator infrastructure.

Key Management

  • Store validator keys in hardware security modules (HSMs) when possible
  • Never expose private keys in environment variables or logs
  • Use separate keys for signing and encryption
  • Implement key rotation procedures

Network Security

  • Run nodes behind firewalls with minimal exposed ports
  • Use VPNs for remote administration
  • Enable DDoS protection for public endpoints
  • Monitor for unusual network activity

System Hardening

  • Keep operating system and dependencies updated
  • Run node software with minimal privileges
  • Enable audit logging for all administrative actions
  • Use containerization for isolation