How Can I Secure My DCS Redis Instances?
Redis is one of the most powerful and widely used open-source cache technologies. However, the open-source Redis does not have robust security features of its own. It is vulnerable to malicious Internet attacks, possibly causing data breaches.
To secure your DCS Redis instances, consider taking the following advice:
- Network connection configurations
- Encrypt sensitive data and disable public access.
Sensitive data must be encrypted before being stored. Do not use public access unless otherwise required.
- Configure access rules for your security groups.
Security groups and VPCs are designed for securing network access. Allow access over as few ports as possible to avoid risks.
- Configure ECS firewalls.
Configure firewall filtering rules for the ECS where your client runs.
- Set the instance password.
- Configure a whitelist.
- Encrypt sensitive data and disable public access.
- redis-cli usage
- Hide the password.
Problem: If the -a <password> option is used, the password may show up when the ps command is run.
Solution: Modify the Redis source code. Hide the password immediately after starting redis-cli by calling the main function.
- Disable sudo in running scripts.
Problem: Parameters for starting redis-cli contain sensitive patterns related to the password, which may show up when the ps command is run and may be logged.
Solution: Access the instance by calling APIs (or through redis-py in Python). Do not allow switching to the dbuser user using sudo in redis-cli.
- Hide the password.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot