For deployment purposes and the greatest flexibility, the system security is setup pretty loose: root access, simple passwords, etc. This is the responsibility of each system operator to lock down to their liking and requirements. Please review some of the topics in this section and adjust accordingly.

in Security
Did this article answer your question?