You are not logged in.

#1 2020-01-25 10:46:54

plsdont
Member
Registered: 2015-12-12
Posts: 23

Securing the client, local DMZ with VMs?

Hi,

I was thinking of making a VM with encrypted virtual disks, only local network with the host and make some kind of a local DMZ where I only allow SSH access and access to the google cloud sites I need to access. Nothing else will be on the VM. Possibly a second VM to do my private stuff, seperate DMZ. Because if someone would break in into my host machine it would be easy to sniff the traffic with the guest i assume. So a VM for the private stuff. Host does nothing else than boot and connect to the web. Would that make sense?

I guess my question is how I get the work related stuff in some super locked down and secure corner or what else I could do. Any suggesstion are very much appreciated.

Thanks

Last edited by plsdont (2020-01-28 13:38:07)

Offline

#2 2020-02-01 07:46:59

Koatao
Member
Registered: 2018-08-30
Posts: 98

Re: Securing the client, local DMZ with VMs?

Hello,
Can you define "super locked down and secure corner"? From what/who are you protecting yourself? Are we talking industrial espionage?

Why not use another computer for your work ?

If you stand with your VM idea, how would you connect to the guest? You said SSH access, so you would run a SSH server on your work VM? Who could access this server?
Why would you need to put your private VM on a DMZ? Private stuff should not be accessible from WAN.

Offline

Board footer

Powered by FluxBB