From 7243f642d2882744f8ec40a758615262521393e6 Mon Sep 17 00:00:00 2001 From: Daan Hoogland Date: Mon, 25 Aug 2025 12:37:31 +0200 Subject: [PATCH 1/2] system resource protection responsibilities --- src/pages/security.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/pages/security.md b/src/pages/security.md index 06530634b0..afcb42e5f2 100644 --- a/src/pages/security.md +++ b/src/pages/security.md @@ -18,10 +18,11 @@ the following usages: - share log files - use any of [the third party integration components](integrations), that are meant for monitoring, storage, network and more. -In addition to that, it is your own responsibility to +In addition to that, it is your own responsibility, as an operator to - protect against DoS and brute-force attacks. - provide full fledged monitoring. Though some facilities are provided, putting appropriate monitoring remains the ultimate responsibility of the operator. +- ensure the security and integrity, including safeguarding them against unauthorized external access of critical cloud resources. These include, but are not limited to OS level access to Hosts, Management Servers, SytemVMs and routers. That all said, the project will work with any one on improving the secure use of the software it provides, with any 3rd party integration From e7f8a623a3724009f6841e65c90d9face1c6a5ed Mon Sep 17 00:00:00 2001 From: Daan Hoogland Date: Mon, 25 Aug 2025 12:50:21 +0200 Subject: [PATCH 2/2] s --- src/pages/security.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/pages/security.md b/src/pages/security.md index afcb42e5f2..8cb9d829b8 100644 --- a/src/pages/security.md +++ b/src/pages/security.md @@ -22,7 +22,7 @@ In addition to that, it is your own responsibility, as an operator to - protect against DoS and brute-force attacks. - provide full fledged monitoring. Though some facilities are provided, putting appropriate monitoring remains the ultimate responsibility of the operator. -- ensure the security and integrity, including safeguarding them against unauthorized external access of critical cloud resources. These include, but are not limited to OS level access to Hosts, Management Servers, SytemVMs and routers. +- ensure the security and integrity, including safeguarding them against unauthorized external access of critical cloud resources. These include, but are not limited to OS level access to Hosts, Management Servers, SystemVMs and routers. That all said, the project will work with any one on improving the secure use of the software it provides, with any 3rd party integration