1.7 KiB
title | description | published | date | tags | editor | dateCreated |
---|---|---|---|---|---|---|
Security in Phyllome OS | true | 2022-01-31T13:00:59.353Z | markdown | 2022-01-31T12:35:54.544Z |
Security in Phyllome OS
Phyllome OS is currently in alpha stage. It should not be used to store any sensitive data {.is-warning}
Phyllome OS is a Fedora Remix and as such directly inherits every single security measures in place for Fedora-related distributions, such as SELinux. It also brings some unique security-related features.
- Unique security-related features
- Unprivileged virtual machines with
qemu:///session
, by default - Filesystem-level encryption with
fscrypt
- Minimal sets of applications by default
- Unprivileged virtual machines with
- Planned features
- Unattended installation of security updates
systemd
hardeninggnome-shell
hardening- The Cloud Hypervisor for
vfio-pci
Features
Data at-rest encryption
Currently, Phyllome OS does not provide any kind of encryption by default at the host level.
It provides early support for Filesystem-level encryption, which is just one line of defense.
For any virtual disks that will contain personal data, users are strongly advised to use full-disk encryption as provided by their guest operating system.
Anti-features
Graphic virtualization
Phyllome OS heavily relies on GPU or graphic virtualization, most notably through virtio-gpu
, but also with vfio-pci
or vfio-mdev
. Granting a virtual machine 3D capabilities is not considered safe. Measures will be taken to reduce the risk, or at least to inform the user of potential security risks associated with certain techniques.