Security Overview
Operating a ComputeNet node requires careful attention to security. This guide covers best practices for securing your validator infrastructure.
Key Management
- Store validator keys in hardware security modules (HSMs) when possible
- Never expose private keys in environment variables or logs
- Use separate keys for signing and encryption
- Implement key rotation procedures
Network Security
- Run nodes behind firewalls with minimal exposed ports
- Use VPNs for remote administration
- Enable DDoS protection for public endpoints
- Monitor for unusual network activity
System Hardening
- Keep operating system and dependencies updated
- Run node software with minimal privileges
- Enable audit logging for all administrative actions
- Use containerization for isolation