mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-09-10 20:37:15 +02:00
Huge role refactoring/cleanup. Other commits will propably follow. Because some bugs will exist. Still important for longrun and also for auto docs/help/slideshow generation
This commit is contained in:
21
roles/core-security/README.md
Normal file
21
roles/core-security/README.md
Normal file
@@ -0,0 +1,21 @@
|
||||
# System Security
|
||||
|
||||
## Description
|
||||
|
||||
This role configures security-related settings on the target system to ensure that essential security services are properly managed. It reinforces system security by integrating with related roles and enforcing best practices.
|
||||
|
||||
## Overview
|
||||
|
||||
The role focuses on:
|
||||
- Configuring key security services such as [SSH](https://en.wikipedia.org/wiki/Secure_Shell).
|
||||
- Integrating with other security roles to maintain a robust system security posture.
|
||||
- Ensuring that security configurations are applied consistently across the system.
|
||||
|
||||
## Purpose
|
||||
|
||||
The primary purpose of this role is to enhance overall system security by managing and configuring essential security services and settings.
|
||||
|
||||
## Features
|
||||
|
||||
- **Security Configuration:** Applies recommended security settings for core services.
|
||||
- **Integration:** Works alongside related roles such as [sshd](https://en.wikipedia.org/wiki/SSH_daemon) to provide comprehensive security management.
|
Reference in New Issue
Block a user