Application security is of utmost importance, and Chainstack has implemented a multitude of security features out of the box.
There are several steps you can take to secure your Chainstack endpoint:
Enable SSL: Ensure that SSL is enabled for your code and when communicating with Chainstack endpoint to encrypt data in transit.
Use Chainstack Key Authentication and Basic Auth wisely: The node information access is confidential since it contains the basic-auth and key protection. Therefore, anyone will be able to use the node endpoint when they had the key or the basic-auth access key. You can see and manage your authentication keys in the Chainstack platform.
Regularly Update: Keep your code and software up-to-date with the latest security patches and updates. This will help protect against known vulnerabilities and exploits.
- Be caution when using 3rd Party tools: Exercise caution when using any third-party tools and libraries, as they can potentially introduce security vulnerabilities into your code and any confidential details.
- Whitelist IP: Whitelisting IP addresses can be a useful security measure to help protect your Chainstack endpoint from unrecognized source. Please refer into articles IP Address Whitelisting Features
By following these steps, you can help ensure the security of your Chainstack endpoint and protect your data and resources. If you have any further questions or concerns, please don't hesitate to reach out to Chainstack support for assistance.
Article is closed for comments.