Depending on circumstances, I'd work on physical security for the master
(perhaps putting the master in a separate locked cabinet), and then login
security for it as well - implement 2FA, such as a proximity card or other
assurance.

Any idea what the threat model is?

Kurt


On Tue, Apr 15, 2014 at 4:11 AM, Andrew S. Baker <[email protected]> wrote:

> Correct... In addition to using certificate-based logons, rather than
> password-based logons.
>
>
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
>
>
>
> On Mon, Apr 14, 2014 at 6:31 PM, Kurt Buff <[email protected]> wrote:
>
>> Aside from using public keys vs. passwords?
>>
>> Kurt
>>
>>
>> On Mon, Apr 14, 2014 at 9:14 AM, Andrew S. Baker <[email protected]>wrote:
>>
>>> Good afternoon:
>>>
>>> I have an interesting question about secure configuration between puppet
>>> orchestration master servers and their minions.
>>>
>>> (for those who don't use puppet, you can look at it here:
>>> http://puppetlabs.com/puppet/puppet-enterprise )
>>>
>>> The question pertains to using SSH to secure the communication between
>>> the master server and its slave servers.  What other mechanisms would you
>>> consider to ensure that this SSH connection does not get abused?  (As it
>>> would essentially be always active)
>>>
>>> Regards,
>>>
>>>
>>>
>>>
>>>
>>>
>>> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
>>> *Providing Virtual CIO Services (IT Operations & Information Security)
>>> for the SMB market…*
>>>
>>>
>>>
>>
>

Reply via email to