Skip to main content

Encryption and Security

Backups often contain secrets and personal data. This module covers encryption, configuration hardening, and least privilege.

Lessons

LessonOutcome
Crypt Remotes and Encrypted LayoutsEncrypt content + filenames
Crypt SetupConfigure crypt remotes with recovery in mind
Credential Hardening and Config SecretsKeep secrets out of scripts
Config PermissionsReduce config exposure on hosts and runners
Least Privilege and Key RotationReduce blast radius and validate runbooks
Key Rotation RunbookRotate safely with staged validation