Skip to main content

🔒 Security Overview

Laniakea implements a comprehensive security architecture designed to protect your infrastructure and data at multiple levels. Our multi-layered validation approach ensures robust security across both frontend and backend systems, while containerized components provide additional isolation and protection.

Access Control Best Practices​

Device Access Management​

To maintain optimal security, we strongly recommend implementing strict access control policies on end devices. Below is an example configuration for JunOS devices that demonstrates secure access control implementation:

login {
class lookingglass {
permissions [ network routing ];
allow-commands "(set cli .*)|(show route protocol bgp .*)|(ping .*)|(traceroute .*)|(exit)";
deny-commands "(.*)";
}
}
}

This configuration creates a restricted lookingglass user class with precisely defined permissions, allowing only essential networking commands while blocking all other operations.

Security Checklist​

To ensure maximum security in your Laniakea deployment, follow these essential practices:

  1. System Updates

    • Maintain regular update schedules for all end devices
    • Apply security patches promptly
  2. Rate Limiting

    • Configure appropriate rate limits in your Laniakea settings
    • Monitor and adjust limits based on usage patterns
  3. Access Control

    • Implement principle of least privilege for all user accounts
    • Regularly audit user permissions and access levels
    • Remove or modify access for inactive or departed users