XCP-NG vs PROXMOX security hardening?
from marauding_gibberish142@lemmy.dbzer0.com to selfhosted@lemmy.world on 04 Apr 23:13
https://lemmy.dbzer0.com/post/41484471
from marauding_gibberish142@lemmy.dbzer0.com to selfhosted@lemmy.world on 04 Apr 23:13
https://lemmy.dbzer0.com/post/41484471
It’s been a while since I visited this topic, but a few years back, Xen (and by extension XCP-NG) was better known for security whilst KVM (and thus Proxmox) was considered for better performance (yes, I’ve heard of the rumours of AWS moving to KVM from Xen for some appliances).
I would like to ask the community about the security measures you’ve taken to harden the default PROXMOX and XCP-NG installations. Have you run the CIS benchmarks and performed hardening that way? Did you enable 2FA?
I’m also interested in people who run either of these in production: what steps did you take? Did you patch the Debian base (for PVE)/Fedora base (I think, for XCP)?
Thank you for responding!
threaded - newest
Kind of a vague question, but I take it you mean OS-level hardening, which should be fine with CIS hardening.
In a virtualized environment, there are many security layers to take care of: network access, storage, api control, identity access, cluster config, backups, etc.