# ๐Ÿ›ก๏ธ Security Model **๐Ÿ”ด Advanced Guide** This document outlines the security architecture protecting the homelab infrastructure, including network security, authentication, secrets management, and data protection. --- ## ๐Ÿ—๏ธ Security Architecture Overview ``` โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ SECURITY LAYERS โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ โ”‚ โ”‚ LAYER 1: PERIMETER โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Internet โ”€โ”€โ–บ Router Firewall โ”€โ”€โ–บ Only 80/443 exposed โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ Cloudflare (DDoS, WAF, SSL) โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ”‚ LAYER 2: NETWORK โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ Main โ”‚ โ”‚ IoT โ”‚ โ”‚ Guest โ”‚ (WiFi isolation) โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ Network โ”‚ โ”‚ WiFi โ”‚ โ”‚ Network โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ”‚ LAYER 3: ACCESS โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Tailscale VPN โ”€โ”€โ–บ Secure remote access to all services โ”‚ โ”‚ โ”‚ โ”‚ Nginx Proxy Manager โ”€โ”€โ–บ Reverse proxy with SSL termination โ”‚ โ”‚ โ”‚ โ”‚ Individual service authentication โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ”‚ LAYER 4: APPLICATION โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Vaultwarden โ”€โ”€โ–บ Password management โ”‚ โ”‚ โ”‚ โ”‚ .env files โ”€โ”€โ–บ Application secrets โ”‚ โ”‚ โ”‚ โ”‚ Docker isolation โ”€โ”€โ–บ Container separation โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ ``` --- ## ๐Ÿ”ฅ Network Security ### **Perimeter Defense** #### Router Firewall | Rule | Direction | Ports | Purpose | |------|-----------|-------|---------| | Allow HTTP | Inbound | 80 | Redirect to HTTPS | | Allow HTTPS | Inbound | 443 | Reverse proxy access | | Block All | Inbound | * | Default deny | | Allow All | Outbound | * | Default allow | #### Cloudflare Protection - **DDoS Protection**: Always-on Layer 3/4/7 protection - **WAF Rules**: Web Application Firewall for common attacks - **SSL/TLS**: Full (strict) encryption mode - **Rate Limiting**: Configured for sensitive endpoints - **Bot Protection**: Managed challenge for suspicious traffic ### **Network Segmentation** | Network | Type | Purpose | Isolation | |---------|------|---------|-----------| | **Main Network** | Wired/WiFi | Trusted devices, servers | Full access | | **IoT WiFi** | WiFi only | Smart home devices | Internet only, no LAN access | | **Guest Network** | WiFi only | Visitors | Internet only, isolated | > **Note**: Full VLAN segmentation is planned but not yet implemented. Currently using WiFi-based isolation for IoT devices. ### **Tailscale VPN Overlay** All internal services are accessible via Tailscale mesh VPN: ``` โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ TAILSCALE MESH NETWORK โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚Atlantis โ”‚โ—„โ”€โ”€โ–บโ”‚ Calypso โ”‚โ—„โ”€โ”€โ–บโ”‚ Homelab โ”‚ โ”‚ โ”‚ โ”‚ NAS โ”‚ โ”‚ NAS โ”‚ โ”‚ VM โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ–ฒ โ–ฒ โ–ฒ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ”‚ โ–ผ โ–ผ โ–ผ โ”‚ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ โ”‚ โ”‚ Mobile โ”‚ โ”‚ Laptop โ”‚ โ”‚ Edge โ”‚ โ”‚ โ”‚ โ”‚ Devices โ”‚ โ”‚ MSI โ”‚ โ”‚ Devices โ”‚ โ”‚ โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ”‚ โ”‚ โ”‚ โ”‚ Benefits: โ”‚ โ”‚ โ€ข End-to-end encryption (WireGuard) โ”‚ โ”‚ โ€ข Zero-trust network access โ”‚ โ”‚ โ€ข No port forwarding required โ”‚ โ”‚ โ€ข Works behind NAT/firewalls โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ ``` --- ## ๐Ÿ” Authentication & Access Control ### **Authentication Strategy** | Method | Services | Notes | |--------|----------|-------| | **Individual Logins** | All services | Each service has its own authentication | | **Vaultwarden** | Password storage | Bitwarden-compatible, self-hosted | | **Tailscale ACLs** | Network access | Controls which devices can reach which services | ### **Service Authentication Matrix** | Service Category | Auth Method | 2FA Support | Notes | |-----------------|-------------|-------------|-------| | **Plex** | Plex account | Yes | Cloud-linked auth | | **Portainer** | Local admin | Yes (TOTP) | Container management | | **Grafana** | Local accounts | Yes (TOTP) | Monitoring dashboards | | **Vaultwarden** | Master password | Yes (required) | FIDO2/TOTP supported | | **Nginx Proxy Manager** | Local admin | No | Internal access only | | **Git (Gitea)** | Local accounts | Yes (TOTP) | Code repositories | | **Immich** | Local accounts | No | Photo management | ### **Access Levels** ``` ADMIN (You) โ”œโ”€โ”€ Full access to all services โ”œโ”€โ”€ Portainer management โ”œโ”€โ”€ Infrastructure SSH access โ””โ”€โ”€ Backup management FAMILY โ”œโ”€โ”€ Media services (Plex, Jellyfin) โ”œโ”€โ”€ Photo sharing (Immich) โ””โ”€โ”€ Limited service access GUESTS โ”œโ”€โ”€ Guest WiFi only โ””โ”€โ”€ No internal service access ``` --- ## ๐Ÿ—๏ธ Secrets Management ### **Password Management** - **Vaultwarden**: Self-hosted Bitwarden server - **Location**: Atlantis NAS - **Access**: `vault.vish.gg` via Tailscale - **Backup**: Included in NAS backup rotation ### **Application Secrets** | Secret Type | Storage Method | Location | |-------------|---------------|----------| | **Database passwords** | `.env` files | Per-stack directories | | **API keys** | `.env` files | Per-stack directories | | **SSL certificates** | File system | Nginx Proxy Manager | | **SSH keys** | File system | `~/.ssh/` on each host | | **Portainer env vars** | Portainer UI | Stored in Portainer | ### **Environment File Security** ```bash # .env files are: # โœ… Git-ignored (not committed to repos) # โœ… Readable only by root/docker # โœ… Backed up with NAS backups # โš ๏ธ Not encrypted at rest (TODO) # Best practices: chmod 600 .env chown root:docker .env ``` ### **Future Improvements** (TODO) - [ ] Implement HashiCorp Vault or similar - [ ] Docker secrets for sensitive data - [ ] Encrypted .env files - [ ] Automated secret rotation --- ## ๐Ÿ”’ SSL/TLS Configuration ### **Certificate Strategy** | Domain/Service | Certificate Type | Provider | Auto-Renewal | |---------------|-----------------|----------|--------------| | `*.vish.gg` | Wildcard | Cloudflare (via NPM) | Yes | | Internal services | Let's Encrypt | ACME DNS challenge | Yes | | Self-signed | Local CA | Manual | No | ### **Nginx Proxy Manager** Primary reverse proxy handling SSL termination: ``` Internet โ”€โ”€โ–บ Cloudflare โ”€โ”€โ–บ Router:443 โ”€โ”€โ–บ NPM โ”€โ”€โ–บ Internal Services โ”‚ โ”œโ”€โ”€ plex.vish.gg โ”€โ”€โ–บ Atlantis:32400 โ”œโ”€โ”€ grafana.vish.gg โ”€โ”€โ–บ Homelab:3000 โ”œโ”€โ”€ git.vish.gg โ”€โ”€โ–บ Calypso:3000 โ””โ”€โ”€ ... (other services) ``` ### **SSL Configuration** - **Protocol**: TLS 1.2+ only - **Ciphers**: Modern cipher suite - **HSTS**: Enabled for public services - **Certificate transparency**: Enabled via Cloudflare --- ## ๐Ÿ’พ Backup Security ### **Backup Locations** | Location | Type | Encryption | Purpose | |----------|------|------------|---------| | **Atlantis** | Primary | At-rest (Synology) | Local fast recovery | | **Calypso** | Secondary | At-rest (Synology) | Local redundancy | | **Backblaze B2** | Offsite | In-transit + at-rest | Disaster recovery | ### **Backup Encryption** - **Synology Hyper Backup**: AES-256 encryption option - **Backblaze B2**: Server-side encryption enabled - **Transit**: All backups use TLS in transit ### **3-2-1 Backup Status** ``` โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ 3-2-1 BACKUP RULE โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ โ”‚ โ”‚ 3 Copies: โ”‚ โ”‚ โ”œโ”€โ”€ 1. Original data (Atlantis) โœ… โ”‚ โ”‚ โ”œโ”€โ”€ 2. Local backup (Calypso) โœ… โ”‚ โ”‚ โ””โ”€โ”€ 3. Offsite backup (Backblaze) โœ… โ”‚ โ”‚ โ”‚ โ”‚ 2 Media Types: โ”‚ โ”‚ โ”œโ”€โ”€ NAS storage (Synology) โœ… โ”‚ โ”‚ โ””โ”€โ”€ Cloud storage (Backblaze B2) โœ… โ”‚ โ”‚ โ”‚ โ”‚ 1 Offsite: โ”‚ โ”‚ โ””โ”€โ”€ Backblaze B2 (cloud) โœ… โ”‚ โ”‚ โ”‚ โ”‚ STATUS: โœ… Compliant โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ ``` --- ## ๐Ÿ•ต๏ธ Monitoring & Intrusion Detection ### **Active Monitoring** | Tool | Purpose | Alerts | |------|---------|--------| | **Uptime Kuma** | Service availability | ntfy, Signal | | **Prometheus** | Metrics collection | Alertmanager | | **Grafana** | Visualization | Dashboard alerts | | **WatchYourLAN** | Network device discovery | New device alerts | ### **Log Management** - **Dozzle**: Real-time Docker log viewer - **Synology Log Center**: NAS system logs - **Promtail/Loki**: Centralized logging (planned) ### **Security Alerts** - Failed SSH attempts (via fail2ban where deployed) - New devices on network (WatchYourLAN) - Service downtime (Uptime Kuma) - Backup failures (Hyper Backup notifications) --- ## ๐Ÿšจ Incident Response ### **Compromise Response Plan** 1. **Isolate**: Disconnect affected system from network 2. **Assess**: Determine scope of compromise 3. **Contain**: Block attacker access, change credentials 4. **Eradicate**: Remove malware, patch vulnerabilities 5. **Recover**: Restore from known-good backup 6. **Review**: Document incident, improve defenses ### **Emergency Access** - **Physical access**: Always available for NAS/servers - **Tailscale**: Works even if DNS is compromised - **Out-of-band**: Console access via IPMI/iLO where available --- ## ๐Ÿ“‹ Security Checklist ### **Regular Tasks** - [ ] Weekly: Review Uptime Kuma alerts - [ ] Monthly: Check for service updates - [ ] Monthly: Review Cloudflare analytics - [ ] Quarterly: Rotate critical passwords - [ ] Quarterly: Test backup restoration ### **Annual Review** - [ ] Audit all service accounts - [ ] Review firewall rules - [ ] Update SSL certificates (if manual) - [ ] Security assessment of new services - [ ] Update this documentation --- ## ๐Ÿ”ฎ Future Security Improvements | Priority | Improvement | Status | |----------|-------------|--------| | High | VLAN segmentation | Planned | | High | Centralized auth (Authentik/Authelia) | Planned | | Medium | HashiCorp Vault for secrets | Planned | | Medium | Automated security scanning | Planned | | Low | IDS/IPS (Suricata/Snort) | Considering | --- ## ๐Ÿ“š Related Documentation - **[Network Architecture](networking.md)**: Detailed network setup - **[Storage Systems](storage.md)**: Backup and storage configuration - **[Host Infrastructure](hosts.md)**: Server and NAS documentation --- *Security is an ongoing process. This documentation is updated as the infrastructure evolves.*