Chapter 9. Security Best Practices in Salt
In the previous chapter, you learned how to use the event system and the reactor in Salt to make a reactive, dynamic, and auto-healing infrastructure.
In this chapter, you will learn best practices to secure your Salt infrastructure. You will learn the following topics:
Security configuration options
Key management
Firewall and network configuration