Network and security

Network and Security settings are crucial for maintaining connectivity, accessibility, and protection of cloud-based workloads.

As your cloud infrastructure grows, managing networking and security properly ensures that applications remain fast, reliable, and secure from cyber threats.

Key concepts

Virtual Private Clouds (VPCs)

A VPC (Virtual Private Cloud) is a logically isolated network within NebCompute where you deploy servers and resources.

It acts as a private data center in the cloud, offering control over networking configurations. VPCs allow the usage of custom IP address ranges and subnet divisions and make sure internal communication between instances is secure without exposing them to the internet.

Subnets

Subnets are smaller network segments within a VPC, that help organize and manage resources efficiently. Each subnet can have specific firewall rules to control access that can either be

  • Public: For resources (e.g., web servers) in these subnets are accessible from the internet.
  • Private: For internal workloads (e.g., databases) that shouldn't be exposed publicly.

Security groups

Security groups act as virtual firewalls that define what network traffic is allowed to and from a server.

  • Inbound rules: Control traffic coming into the server (e.g., allowing SSH on port 22).
  • Outbound rules: Control traffic going out from the server (e.g., allowing HTTP requests).

Key pairs (SSH Authentication)

Key pairs are cryptographic authentication methods for securely connecting to cloud servers via SSH. This ensures only authorized users can access cloud resources. Key pairs are more secure than passwords, and they’re made of:

  • Private key: Stored on the user's computer, used for authentication.
  • Public key: Stored on the server, verifying the private key.

To ensure the security of your NebCompute instances, we recommend you:

  1. Prioritize the use of private networking configurations whenever possible.
  2. Restrict access with security groups to implement least privilege access principles.
  3. Monitor and audit network traffic to check for misconfigurations and catch any suspicious activities.

Need help?

If you have any technical questions or encounter any problems, get in touch with our Support team! We're here to help, and will provide support if you encounter any issues with NebCompute.