{% extends "base.html" %} {% block breadcrumb %}{{ block.super }}
  • Security
  • {% endblock %} {% block content %}

    Security

    Use the following tools to secure the cloud during a security event

    Scenario: Project account credentials have been compromised.

    Action: Disable the user or project. This should invalidate the credentials, also deny the specific port assigned to the user.

    {% csrf_token %}
    {% for field in project_form %} {{ field.label_tag }} {% if field.errors %}{{ field.errors }}{% endif %} {{ field }} {% endfor %}

    Scenario: The issue pin points to be coming in from a specific external ip or ip range.

    Action: Block the IP or IP range. This should manipulate ip tables to block the ip or ip range.

    {% csrf_token %}
    {% for field in ip_form %} {{ field.label_tag }} {% if field.errors %}{{ field.errors }}{% endif %} {{ field }} {% endfor %}

    Scenario: Issues affecting multiple public entry points or could not determine to be a specific one.

    Action: Disable all public IPs on all VMs. This should unplumb the device the public ip was on.

    {% csrf_token %}

    Scenario: Issue related to VPN service affecting multiple customers.

    Action: Disable VPN service. This should turn off the VPN ip.

    {% csrf_token %}
    {% endblock %}