Skip to content

Commit f020dcc

Browse files
committed
fix(use case): finish security use case
1 parent 82fd18f commit f020dcc

File tree

2 files changed

+45
-1
lines changed

2 files changed

+45
-1
lines changed

pages/use-cases/security/index.mdx

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,13 @@ Protect your cloud resources with Scaleway's security solutions. From network se
2121
label="Read more"
2222
url="/use-cases/"
2323
/>
24+
<SummaryCard
25+
title="Security baseline for Scaleway infrastructure"
26+
icon="rocket"
27+
description="Establish a strong security foundation for your Scaleway infrastructure."
28+
label="Read more"
29+
url="/use-cases/security/security-baseline/"
30+
/>
2431
</Grid>
2532

2633
## Related tutorials

pages/use-cases/security/security-baseline.mdx

Lines changed: 38 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ You can use resources such as Public Gateways and Load Balancers to **provide ac
2929

3030
You can set up a Network Access Control List (NACL) for each VPC. This allows you to define rules to limit the flow of traffic between the Private Networks of the VPC according to your needs.
3131

32-
<Lightbox src="scaleway-vpc-infra-1.webp" alt="An architecture diagram shows how a Load Balancer inside a Scaleway VPC is attached to a Private Network. Also attached to the Private Network are three Instances (connected to Block Storage), a Managed Database, and a Public Gateway." />
32+
<Lightbox image={image} alt="An architecture diagram shows how a Load Balancer inside a Scaleway VPC is attached to a Private Network. Also attached to the Private Network are three Instances (connected to Block Storage), a Managed Database, and a Public Gateway." />
3333

3434
Find out more:
3535

@@ -139,3 +139,40 @@ Find out more:
139139

140140
- [Audit Trail Quickstart](/audit-trail/quickstart/)
141141
- [Audit Trail product integration](/audit-trail/reference-content/resource-integration-with-adt/)
142+
143+
## Summary of security recommendations
144+
145+
**Prioritize private connectivity**
146+
- Remove public (flexible) IPs from resources unless absolutely necessary to reduce exposure.
147+
- Favor access via layer 2 Private Networks, within layer 3 VPCs.
148+
- Use Public Gateways or Load Balancers for controlled internet access within a Private Network.
149+
150+
**Implement Security Groups**
151+
- Use security groups as as virtual firewalls for your Instances.
152+
- Customize their rules to allow only required traffic; avoid default permissive settings.
153+
154+
**Leverage Edge Services WAF**
155+
- Protect applications behind Scaleway Load Balancers by setting up an Edge Services pipeline.
156+
- Activate the pipeline's Web Application Firewall feature, to block common threats.
157+
- Configure paranoia levels and exclusions as needed.
158+
159+
**Apply least privilege with Identity and Access Management (IAM)**
160+
- Use IAM policies to give users and applications only the permissions they need.
161+
- Avoid using high-privilege Organization Owner keys in applications.
162+
163+
**Enforce Multi-Factor Authentication (MFA)**
164+
- Require MFA for all Organization Members to prevent unauthorized access.
165+
- Use TOTP apps or passkeys for second-factor authentication.
166+
167+
**Use Identity Federation**
168+
- Centralize identity management and eliminate per-platform credential risks.
169+
- Integrate with SSO via OAuth2 or SAML.
170+
171+
**Monitor with Scaleway Cockpit**
172+
- Visualize metrics, logs, and traces using Grafana dashboards.
173+
- Set up real-time alerts for suspicious activity or performance issues.
174+
175+
**Enable Audit Trail**
176+
- Track all actions within your Organization.
177+
- Enhance compliance, troubleshooting, and post-incident analysis.
178+

0 commit comments

Comments
 (0)