Would you have to compromise on your security according to your threat model if you ran VMs rather than dedicated devices? I’m no security engineer and I don’t know if KVM/QEMU can fit everyones needs, but AWS uses XCP-ng, and unless they’re using a custom version of it, all changes are pushed upstream. I’d definitely trust AWS’ underlying virtualisation layer for my VMs, but I wonder if I should go with XCP or KVM or bhyve.
This is my personal opinion, but podman’s networking seems less difficult to understand than Docker. Docker was a pain the first time I was reading about the networking in it.
Really like your setup. Do you have any plans to make it more private/secure?
Appoxo@lemmy.dbzer0.com 11 months ago
Why would you rotate passsord though?
Rather choose something random and strong than changing it every 6th moon.
easeKItMAn@lemmy.world 11 months ago
Rotating passwords only for web services. Vaultwarden does make it easy. Not all services allow 2FA.
Appoxo@lemmy.dbzer0.com 11 months ago
Sounds still excessive but that’s what the thread is here for.
Would probably understand it more if I knew more aspects.
Cheers to more cybersec :)
easeKItMAn@lemmy.world 11 months ago
Guessing it is more a habit from back in time when ssl certification wasn’t common. Panic of MITM attacks, friends sharing their trusted access to other friends, etc. all contributed to my actual status of paranoia.
Don’t make me reconsider my cybersec approach ;)