Secure Login and Access

Securing access to your servers is critical because it is the first line of defence against unauthorised access and potential breaches. Most security incidents are caused by inadequate access controls, such as weak or default passwords, stolen credentials, and lack of...

Logging guidelines

Based on EGI Security Traceability and Logging Policy all certified EGI sites need to have a remote logging service in place. By storing logs remotely, you protect them from being tampered with or deleted by attackers who gain access to your systems. This ensures the...

Crypto miners

The EGI CSIRT has recently had several reports of malicious activities, where parts of infrastructures have been infected with cryptomining software. Crypto miners are tools that generate cryptocurrency, like Bitcoin. As these can generate profit relatively easily, it...