Harden M1 OS: SSH key-only, firewall, audit #33

Open
opened 2025-09-01 14:10:01 +00:00 by chris · 0 comments
Owner

Description

  • Implement SSH key-only access, disable root login, create admin users.
  • Configure NixOS firewall rules to only allow necessary management ports.
  • Enable journald audit logging and basic system-level audits.

Priority: P0
Estimate: 8 hours
Acceptance criteria

  • No password SSH login possible; root login disabled.
  • Firewall blocks unexpected ports; admin can still access required services.
  • Audit rules in place and logs stored/rotated.
Description - Implement SSH key-only access, disable root login, create admin users. - Configure NixOS firewall rules to only allow necessary management ports. - Enable journald audit logging and basic system-level audits. Priority: P0 Estimate: 8 hours Acceptance criteria - No password SSH login possible; root login disabled. - Firewall blocks unexpected ports; admin can still access required services. - Audit rules in place and logs stored/rotated.
chris added this to the A - Foundations & Hardened Management Node milestone 2025-09-01 14:10:01 +00:00
chris added the
security
hardening
nix
labels 2025-09-01 14:10:01 +00:00
chris self-assigned this 2025-09-01 14:10:01 +00:00
chris changed title from A2 — Harden M1 OS: SSH key-only, firewall, audit to Harden M1 OS: SSH key-only, firewall, audit 2025-09-01 14:13:37 +00:00
chris added this to the MVP project 2025-09-03 06:51:58 +00:00
This repository is archived. You cannot comment on issues.
No description provided.