-
If/when exploits are found you're left to your own devices. It'd be really useful if there was a catalogue of advice somewhere about resolving these exploits, perhaps in this project's wiki?
samhh updated
3 years ago
-
### Description
I have installed latest ansible. I am running Python 2.7. Ansible is installed using pip.
This is my playbook:
```
- hosts: newhardenings
become: true
gather_facts: tru…
-
- [ ] battery: add connector, choose cell
- [ ] antenna: current antenna fine? possible to do something like airtag antenna?
- [ ] peripherals: not sure if anything else is needed. USB-C?
- [ ] rou…
-
Hi,
I'll suggest to add the following to the systemd service file. @calmh
```
LockPersonality=true
ProtectClock=true
ProtectControlGroups=true
ProtectKernelTunables=true
ProtectKernelLogs=…
-
### Code of Conduct
- [X] I have read and agree to the GitHub Docs project's [Code of Conduct](https://github.com/github/docs/blob/main/.github/CODE_OF_CONDUCT.md)
### What article on docs.github.co…
-
### What is this task and why do we need to work on it?
The DA task only has two tests, yet has several nontrivial code paths. We need to evaluate and improve the testing.
### What work will nee…
-
What are the steps we need to take to ensure security of our CICD pipelines.
-
-
We should provide a list of 3rd party software perfSONAR depends on along with instructions or pointers and maybe a checklist to harden the setup and configuration of those tools. This can be added o…
-
Placeholder. To be done in sprint 6.