network-vault/README.md

32 lines
1.9 KiB
Markdown
Raw Permalink Normal View History

2021-06-12 01:17:01 +02:00
# Network Vault
Ansible playbook for network vault.
2021-06-12 01:22:03 +02:00
* This creates a share vault on the target server which is writeable.
* A second share is read only and keeps snapshots of the data from the rw-share.
* Everey 4 hours, rsnapshot creates cheap copies of the data on the ro-share.
* How long the data will be kept depends on settings in rsnapshot.conf
2021-06-12 01:17:01 +02:00
2021-06-12 01:19:00 +02:00
## Use-Case:
2021-06-12 01:26:21 +02:00
* Create a immutable, WORM-Like Network-Share that holds REALLY!!! sensitive data like disaster-recovery-plans, password databases, network-plans, contact-lists - all the data that should not be encrypted and you need in case of ransomware-attack to bootstrap youself.
2021-06-12 01:22:03 +02:00
* When ransomware locks down your systems, this is your machine to go, plug in a console and start recovery.
2021-06-12 01:23:36 +02:00
* When sealing the vault, you can not access it over ssh any more, change settings, access system over network so no ransomware can to this either.
2021-06-12 01:23:56 +02:00
* You should **NOT NOT NOT NOT** have a KVM-Console connected because this can be used to access the system over the network
2021-06-12 01:26:52 +02:00
* Place this machine on something like an Intel NUC, paint it red and put it into a safe place where you have network connection.
2021-06-12 01:22:03 +02:00
* Create any job to copy your DR-plans there regular.
* It uses cron-apt to update the system and reboots at 6 in the morning to keep kernel up to date
2021-06-12 01:17:01 +02:00
2022-09-03 18:14:59 +02:00
Variables:
2021-06-12 01:17:01 +02:00
* networkvault_vault_password -> password for user to access shares
* networkvault_seal_vault -> when set to "true" it will uninstall ssh-server to prevent any access via network
ToDo:
* Quota to ensure, space*backup-copies can not be exceed disk space and break backups by abusing share
* Check diff-size and do some kind of alter
* Add monitoring-agent/SNMP-support to be able to monitor system (alive? disk OK?)
2021-06-12 11:00:16 +02:00
* Add more interfaces like WebDAV, FTP, email to receive data
2021-06-12 01:17:01 +02:00
* Only reboot if required
2021-06-12 01:27:21 +02:00
* check no unneeded ports open/block with firewall
* encrypt harddrive
2021-06-12 11:00:16 +02:00
* copy date on flash drive to have some kind of "rescue-dongle"
* build checksums and signatures of data