- Remove traces of gnupg-1.4, as everything is finally gnupg-2.x - Switch to using ECC cryptography for the subkeys - Stop calling the certification subkey the "master key" as it's a bad analogy and that terminology isn't used anywhere in GnuPG docs Signed-off-by: Konstantin Ryabitsev <firstname.lastname@example.org>
|2 years ago|
|.gitignore||8 years ago|
|CHANGELOG.md||6 years ago|
|COPYING||8 years ago|
|README.md||2 years ago|
|TRANSLATIONS.md||6 years ago|
|linux-workstation-security.md||2 years ago|
|protecting-code-integrity.md||2 years ago|
|trusted-team-communication.md||2 years ago|
Useful IT Policies
In this repository we provide generalized IT policies adapted from those used internally by our IT staff in hopes that they will come in handy for other organizations, and especially for open-source projects who rely on volunteer admin efforts to manage their infrastructure.
We invite all others to participate, share and donate back their knowledge and expertise to help create a library of checklists and best practice documents that can be freely used and adapted by others.
Documents in this repository are licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/ or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA.