Current best practice for securing a droplet?
I see a lot of the most recent tutorials only detail securing a droplet with UFW or the DO droplet firewall. I recall a number of years ago there were many tutorials advocating Fail2Ban etc. are these still recommended?
I currently use SSH with public key login only, no passwords and wish to use my droplet to host a Postgres database for remote usage whilst developing a django app which I’ll eventually host on DO.
These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.×