Cloudsy news

Network Security for Virtual Machines in Cloudsy

Cloudsy provides customers with direct access to core network security controls such as ACL, SLB, and NAT. These mechanisms allow precise control over inbound and outbound traffic - but they also require understanding what rules are applied and why. Security is powerful only when configured correctly.

When creating a Linux virtual machine, customers can optionally add their own SSH public key. This allows secure, passwordless access for the first login, simplifying initial configuration while reducing exposure to credential-based attacks. Regarding the root account, security best practices recommend disabling SSH access for root. This limits attack vectors while preserving full administrative control through safer access methods.

If a VM is suspected of malware infection or an ongoing attack, it can be instantly isolated from the internet using a single control - the “LINK” button. This immediately stops external communication while keeping the VM available for analysis and recovery.

Security in Cloudsy means practical control:
✅ Customers can configure ACL, SLB, and NAT themselves,
✅ Optional SSH key-based access for secure, passwordless login,
✅ Privileged access control to keep VMs safe,
✅ Instant isolation from the internet when required.