Digital Marketing

Encryption key on Linux

If you are using Linux platform as a desktop, it is good to encrypt the keys using a passphrase and setting up such a way that the password is used to decrypt the disk encryption key upon login.

But, if your Linux system is unattended, then it is good to use bus-attached Hardware Security Modules or use Network attached HSMs in case you are deploying your Linux system as a VM in public or private clouds.

Comments

Popular posts from this blog

MySQL Sandbox with the Sakila sample database