Join 1M+ other developers and:
- Get help and share knowledge in Q&A
- Subscribe to topics of interest
- Get courses & tools that help you grow as a developer or small business owner
Current best practice for securing a droplet?
I see a lot of the most recent tutorials only detail securing a droplet with UFW or the DO droplet firewall. I recall a number of years ago there were many tutorials advocating Fail2Ban etc. are these still recommended?
I currently use SSH with public key login only, no passwords and wish to use my droplet to host a Postgres database for remote usage whilst developing a django app which I’ll eventually host on DO.
These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.×