|
|
|
@ -71,7 +71,7 @@ security concerns accordingly.
|
|
|
|
|
#### Recommendations
|
|
|
|
|
|
|
|
|
|
- **Use Dedicated Host** - The NIA daemon will potentially have access to critical secrets for your environment’s
|
|
|
|
|
network infrastructure. Using a hardened, dedicated host, for supporting these sensitive operations is highly.
|
|
|
|
|
network infrastructure. Using a hardened, dedicated host, for supporting these sensitive operations is highly recommended.
|
|
|
|
|
|
|
|
|
|
- **Run without Root** - The NIA daemon does not require root or other administrative privileges to operate.
|
|
|
|
|
|
|
|
|
|