Security & Hardening

Protecting the Perimeter: SSL, Firewalls, and Access Control.

The CIA Triad

Information security is built on three pillars: Confidentiality, Integrity, and Availability. On this server, we achieve this through encrypted tunnels (HTTPS) and restrictive firewall rules.

SSL/TLS Encryption

Using Let's Encrypt to ensure that sensitive data remains encrypted while in transit between the client and the Nginx server.

SSH Hardening

Disabling password authentication in favor of Public Key Infrastructure (PKI) to stop brute-force bots in their tracks.