Files
homelab-optimized/docs/security/zero-trust.md
Gitea Mirror Bot 25c3532414
Some checks failed
Documentation / Deploy to GitHub Pages (push) Has been cancelled
Documentation / Build Docusaurus (push) Has been cancelled
Sanitized mirror from private repository - 2026-04-19 09:44:40 UTC
2026-04-19 09:44:40 +00:00

1.9 KiB
Raw Blame History

ZeroTrust Access Policy

The ZeroTrust concept means never trust, always verify. The following policy documents the controls we enforce across the homelab.

1. Identity & Access Management

Layer Controls
User provisioning LDAP/SSO via Authentik Single signon and MFA enforced.
Rolebased access Service accounts are scoped with least privilege; use service principals for automation.
Temporal access SSH key turnover every 90 days, @ 2FA enforced for remote access.

2. Network Isolation

  • Segmentation Hyperviser networks (vlan101, vlan102) separate functional zones.
  • Private endpoints Services expose only required ports to the Internet via Nginx Proxy Manager with LetsEncrypt certs.
  • TLS All traffic between hosts uses the latest TLS 1.3 and HSTS.

3. Secrets Management

  • Store secrets in Hashicorp Vault with rolebased ACLs.
  • Never commit secrets to Git. Ensure .env files are .gitignoreprotected.
  • Use podman secret or Docker secrets when running in a Docker Swarm.

4. Continuous Verification

  • Automated Compliance Checks CI pipeline runs bandit and trivy scans.
  • Runtime Monitoring Falco and Sysdig detect anomalies.
  • Audit Log All portainer, docker, and system events are forwarded to Loki.

5. Incident Response

  1. • Detect via alerts (Grafana, Prometheus, Falco).
  2. • Verify via docker inspect, docker logs, and the audit app.
  3. • Isolate compromised container: docker pause <id> then identify the VM.
  4. • Rotate secrets and keys immediately.

Policy Owner: Vish email@example.com