Skip to main content

TxCR Best Practices

Guidelines for effective and secure use of the cyber range.

Security

  • ✅ Use SSH keys, not passwords
  • ✅ Keep systems patched and updated
  • ✅ Use strong, unique passwords
  • ✅ Enable firewall rules
  • ✅ Regular backups via snapshots
  • ❌ Don't expose unnecessary services
  • ❌ Don't use default credentials
  • ❌ Don't share login information

Resource Management

  • Right-size VMs (don't over-allocate)
  • Delete unused VMs and snapshots
  • Monitor disk space usage
  • Shutdown VMs when not in use

Networking

  • Document your network topology
  • Use VLANs for isolation
  • Implement proper firewall rules
  • Test changes in isolated environments

Development

  • Use version control (Git)
  • Document your configurations
  • Test before deploying to production
  • Keep development and production separate

See also: FAQ | Troubleshooting