INC-2026-04-04: Prevention
Prevention
Short-term (This Week)
-
Deploy AppArmor on P16g — CR-2026-04-04 — Evan Rosado
-
Verify kernel boot parameters include
lsm=landlock,lockdown,yama,integrity,apparmor,bpf— Evan Rosado -
Load complain-mode profiles for all installed applications — Evan Rosado
Long-term (This Quarter)
-
Add MAC deployment as mandatory phase in workstation deployment runbook — Evan Rosado
-
Write custom AppArmor profiles for high-risk apps (node, browsers, Docker) — Evan Rosado
-
Deploy AppArmor on modestus-razer (same gap) — Evan Rosado
-
Create AppArmor profile for Claude Code / npm processes — Evan Rosado
-
Add MAC verification to Phase 11 hardening checklist — Evan Rosado
Lessons Learned
What Went Well
-
Gap discovered during routine setup, not during an actual breach
-
Systematic investigation of domus-digitalis setup failure led to broader security audit
-
Arch kernel already has AppArmor compiled in — remediation path is straightforward
What Could Be Improved
-
Deployment runbook had no security hardening checklist beyond "hardening" bullet point
-
MAC was never part of the Razer setup either — this is inherited technical debt
-
No automated security posture verification exists for workstation deployments
Key Takeaways
|
Related
-
CR: P16g AppArmor Deployment — Remediation change request