- 1. Introduction
- 2. Must read
- 2.1. Threat Model
- 2.2. At a high level
- 2.3. Hardware security keys
- 2.4. Multi-factor authentication
- 2.5. Cryptographic wallets
- 2.6. Work devices
- 2.6.1. Software updates
- 3. For developers
- 3.1. SSH keys
- 4. For administrators
- 4.1. Separate admin accounts
- 4.2. GitHub hardening
- 4.3. Email hardening
- 5. Physical security
- 5.1. Traveling
- 6. Contacts