Security Baseline
This document outlines the baseline security principles of the HomeOps Server Foundation. The goal is to define a clear, minimal, and auditable security posture for the platform foundation phase.
This baseline focuses on principles and intent rather than detailed configurations or enforcement mechanisms.
Table of Contents
- Security Scope
- Identity and Access Model
- Secure Remote Access (SSH)
- Network Security Principles
- Firewall Philosophy
- Logging and Visibility
- Related Architecture Decisions
- Documentation Boundary
- Hardening Log
- Administrative Access Hardening (Phase 1)
- Attack Surface Reduction (Phase 1)
Security Scope
The security baseline at this stage applies to:
- The Proxmox VE host
- Management access paths
- Identity and access model
- Network exposure principles
Detailed configuration steps and hardening measures are documented in internal project documentation.
Identity and Access Model
- The Proxmox host is administered through authenticated management access.
- Privileged access is limited to designated administrative users.
- Role separation is preferred over shared credentials.
- Interactive access is intended for administration only, not for application runtime.
The user and permission model is defined to support traceability and controlled access, even in a single-admin environment.
Secure Remote Access (SSH)
- Remote administrative access is performed over SSH.
- SSH is treated as a management interface, not a general-purpose access method.
- Password-based access is avoided in favor of key-based authentication where possible.
- SSH exposure is limited to trusted networks.
Detailed SSH configuration and hardening steps are maintained in internal documentation.
Network Security Principles
- The Proxmox host exposes only required management services.
- No application services are directly exposed from the host.
- Network segmentation is planned but not yet implemented in Phase 1.
- IPv6 is intentionally not enabled during the initial foundation phase.
The network design prioritizes predictability and minimal exposure over flexibility at this stage.
Firewall Philosophy
- No host-level firewall rules are actively enforced during the initial foundation phase.
- Firewall policies will be introduced incrementally once service roles are defined.
- Network-level controls (e.g. upstream router) provide the primary perimeter at this stage.
Firewall rules and enforcement details will be introduced in later phases and documented separately.
Logging and Visibility
- System logs are retained locally on the host.
- Administrative actions are intended to be traceable.
- No centralized logging is deployed during Phase 1.
Logging and observability will be expanded as hosted services are introduced.
Related Architecture Decisions
The security posture described in this document is based on the following architecture decisions:
-
ADR-0001: No IPv6 in Phase 1
IPv6 is intentionally not enabled during the initial foundation phase to reduce complexity and exposure. -
ADR-0002: No Host Firewall Rules in Initial Foundation Host-level firewall rules are deferred until service roles and network segmentation are clearly defined.
Documentation Boundary
This document intentionally avoids:
- IP addressing details
- Firewall rule definitions
- Authentication secrets
- Host-level hardening commands
Such details are maintained exclusively in internal project documentation to support secure operation and rebuildability.
Hardening Log
Administrative Access Hardening (Phase 1)
During the foundation phase, administrative access to the Proxmox VE host was hardened to establish a secure and traceable baseline.
The following measures were implemented:
SSH Hardening
- Dedicated named administrative user created
- Host-specific Ed25519 SSH key deployed
- Password-based authentication disabled
- Keyboard-interactive authentication disabled
- Direct root login over SSH disabled
- SSH access restricted to key-based authentication only
Result: - Brute-force and password-based attacks eliminated - All remote administrative actions attributable to a named identity
User Model Alignment (Linux and Proxmox)
Administrative access was unified across:
- SSH access (Linux user)
sudoprivilege escalation- Proxmox Web UI access (
@pamrealm)
Root account policy:
- Root retained for break-glass use only
- No direct SSH login permitted
- Daily operations performed via named administrative user
Result: - Clear separation between operational and emergency access - Improved auditability and traceability
Sudo and Audit Baseline
sudoprivileges explicitly assigned via group membership- Passwordless sudo not enabled
- All escalation events logged via systemd-journald
- Default PAM configuration retained
- No external identity providers introduced in Phase 1
Result: - Privilege escalation remains explicit and logged - Authentication stack remains predictable and simple
Attack Surface Reduction (Phase 1)
- Unused network services removed
- Local mail transport removed
- Security patching automated (Debian security repositories only)
- Non-security and Proxmox upgrades require manual administrative approval