Mitigations
Modify redis.conf
to disable dangerous commands:
Create a redis user for Redis operations:
Modify redis.conf
to add a password for Redis authentication:
Modify redis.conf
to allow access from localhost only:
Set correct permission for authorized_keys
to prevent attackers from adding their public keys into this file:
Last updated