TxCR Best Practices
Guidelines for effective and secure use of the cyber range.
Security
- ✅ Use SSH keys, not passwords
- ✅ Keep systems patched and updated
- ✅ Use strong, unique passwords
- ✅ Enable firewall rules
- ✅ Regular backups via snapshots
- ❌ Don't expose unnecessary services
- ❌ Don't use default credentials
- ❌ Don't share login information
Resource Management
- Right-size VMs (don't over-allocate)
- Delete unused VMs and snapshots
- Monitor disk space usage
- Shutdown VMs when not in use
Networking
- Document your network topology
- Use VLANs for isolation
- Implement proper firewall rules
- Test changes in isolated environments
Development
- Use version control (Git)
- Document your configurations
- Test before deploying to production
- Keep development and production separate
See also: FAQ | Troubleshooting