Hi,
i got 2 questions to properly secure my data. The setup is one server running PVE an another server running PBS. All on premise. The VMs are stored on thin-provisioned LVMs that are encrypted using LUKS. The key is stored on a hardware token. I am really happy with that. Works great and offers high level of security against our main concern which is simple theft. If something gets stolen the disks cant be encrypted since the token requires a key and bricks itself after 3 failed attempts. The disk with proxmox itself on it is not encrypted.
i got 2 questions to properly secure my data. The setup is one server running PVE an another server running PBS. All on premise. The VMs are stored on thin-provisioned LVMs that are encrypted using LUKS. The key is stored on a hardware token. I am really happy with that. Works great and offers high level of security against our main concern which is simple theft. If something gets stolen the disks cant be encrypted since the token requires a key and bricks itself after 3 failed attempts. The disk with proxmox itself on it is not encrypted.
- I enababled the backup encryption through the gui. It worked and created 2 files for each datastore of the PBS. one *.enc file and one *.pw file. According to the manual the *.enc file needs to be kept safe. I used the paperkey function and will keep the printout safe. However, the file is still on the PVE server (/etc/pve/priv/storage/<STORAGE-ID>). Can i safely shred it or is it required? What about the *.pw file?
- The feature to encrypt backups is done client side. The main purpose is usage with possibly untrusted PBS. I can trust my PBS so i do not require encryption for that reason. I need encryption incase the Disks or the entire PBS gets stolen. Can i somehow use a LUKS container or LVM OR thin-provisioned LVM as a datastore for PBS? If that is possible i can protect the data with the same method i use for PVE. I would prefer that as this solution is already working fine.