Encryption and Security
Backups often contain secrets and personal data. This module covers encryption, configuration hardening, and least privilege.
Lessons
| Lesson | Outcome |
|---|---|
| Crypt Remotes and Encrypted Layouts | Encrypt content + filenames |
| Crypt Setup | Configure crypt remotes with recovery in mind |
| Credential Hardening and Config Secrets | Keep secrets out of scripts |
| Config Permissions | Reduce config exposure on hosts and runners |
| Least Privilege and Key Rotation | Reduce blast radius and validate runbooks |
| Key Rotation Runbook | Rotate safely with staged validation |