wiki/phyllomeos/security.md

1.7 KiB

title description published date tags editor dateCreated
Security in Phyllome OS true 2022-01-31T13:00:59.353Z markdown 2022-01-31T12:35:54.544Z

Security in Phyllome OS

Phyllome OS is currently in alpha stage. It should not be used to store any sensitive data {.is-warning}

Phyllome OS is a Fedora Remix and as such directly inherits every single security measures in place for Fedora-related distributions, such as SELinux. It also brings some unique security-related features.

  • Unique security-related features
    • Unprivileged virtual machines with qemu:///session, by default
    • Filesystem-level encryption with fscrypt
    • Minimal sets of applications by default
  • Planned features
    • Unattended installation of security updates
    • systemd hardening
    • gnome-shell hardening
    • The Cloud Hypervisor for vfio-pci

Features

Data at-rest encryption

Currently, Phyllome OS does not provide any kind of encryption by default at the host level.

It provides early support for Filesystem-level encryption, which is just one line of defense.

For any virtual disks that will contain personal data, users are strongly advised to use full-disk encryption as provided by their guest operating system.

Anti-features

Graphic virtualization

Phyllome OS heavily relies on GPU or graphic virtualization, most notably through virtio-gpu, but also with vfio-pci or vfio-mdev. Granting a virtual machine 3D capabilities is not considered safe. Measures will be taken to reduce the risk, or at least to inform the user of potential security risks associated with certain techniques.


Go back to parent page