Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make MGMT-Host Secure #8

Open
whotwagner opened this issue Jun 27, 2024 · 0 comments
Open

Make MGMT-Host Secure #8

whotwagner opened this issue Jun 27, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@whotwagner
Copy link
Contributor

In scenario1(videoserver) some attacks need actions executed from admin-pc. In order to make those hosts accessible by attackm8, the mgmt-host is allowed to have password-login via ssh. This is insecure in environments where the mgmt-host is hosted with a public ip(public cloudprovider).

I can think of possible solutions like:

  1. create another jumphost, that is only for the simulation and has no floating-ip
  2. add the inet-network to the adminpcs so that they are dual-homed and can directly accessed by attackm8
@whotwagner whotwagner added the enhancement New feature or request label Jun 27, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant