Security Model
Threat Model
Security Principles
Defense in Depth
Multiple independent layers must be compromised:
-
Hardware token (YubiKey)
-
PIN/passphrase knowledge
-
System access
-
Vault passphrase (different from SSH)
Multiple independent layers must be compromised:
Hardware token (YubiKey)
PIN/passphrase knowledge
System access
Vault passphrase (different from SSH)