Security Best Practices¶
Guidelines for secure Espilon deployments.
Key Management¶
- Generate unique keys for each deployment
- Never commit keys to version control
- Rotate keys periodically
- Use strong random keys (openssl rand)
Network Security¶
- Use VPN for remote C2 access
- Firewall C2 server (allow only necessary ports)
- Change default port 2626 if needed
- Monitor C2 server logs
Physical Security¶
- Label devices discreetly
- Secure batteries (prevent disconnection)
- Document deployment locations
- Recovery plan for lost devices
Operational Security¶
- Obtain authorization before deployment
- Document scope of testing
- Notify stakeholders as required
- Secure data collected during testing
- Destroy sensitive data after use
Legal Compliance¶
- Follow local laws and regulations
- Obtain written authorization
- Respect privacy and data protection laws
- Report findings responsibly