I have high security applications, which I want to run on Proxmox. There was security incident before, when attacker could gain root access on host OS. I have no information about how it was done, but I want to minimize the chances.
I want to keep host disconnected from internet and connect it manually only when upgrades are needed. I also want to collect all logs (including packet logs to external server). I already have LUKS disk encryption. I have hw router which terminates wireguard tunnel, only way to ssh to host. Guests will have no ip route to host. I'll not pass thorough any hw. I'll not use LXC.
What is the risk when attacker gets root access to guest vm to gain access to host os? I'm not saying that it did happen, but i suspect it. It's rather old Intel XEONs with spectre and lots of other vulnerability.
Please let me know if there is howto articles, extra recommendations how to deal with this problem.
I want to keep host disconnected from internet and connect it manually only when upgrades are needed. I also want to collect all logs (including packet logs to external server). I already have LUKS disk encryption. I have hw router which terminates wireguard tunnel, only way to ssh to host. Guests will have no ip route to host. I'll not pass thorough any hw. I'll not use LXC.
What is the risk when attacker gets root access to guest vm to gain access to host os? I'm not saying that it did happen, but i suspect it. It's rather old Intel XEONs with spectre and lots of other vulnerability.
Please let me know if there is howto articles, extra recommendations how to deal with this problem.