The CIA Triad
Information security is built on three pillars: Confidentiality, Integrity, and Availability. On this server, we achieve this through encrypted tunnels (HTTPS) and restrictive firewall rules.
SSL/TLS Encryption
Using Let's Encrypt to ensure that sensitive data remains encrypted while in transit between the client and the Nginx server.
SSH Hardening
Disabling password authentication in favor of Public Key Infrastructure (PKI) to stop brute-force bots in their tracks.