grimm-nixos-laptop/hardening/default.nix

16 lines
374 B
Nix

{ lib, config, ... }:
{
imports = [
./systemd
./ssh-as-sudo.nix
];
specialisation.unhardened.configuration = { };
# services.opensnitch.enable = lib.mkForce false;
systemd.tpm2.enable = false;
systemd.enableEmergencyMode = false;
virtualisation.vswitch.enable = false;
services.resolved.enable = false;
security.unprivilegedUsernsClone = true;
}