Dedicated page

Home Lab: infrastructure and security operations

Concise documentation of a personal infrastructure focused on operations, security and monitoring.

Introduction

  • The Home Lab is used as an operations and validation environment: it supports service publication, availability control and a consistent security baseline.
  • Shared information stays intentionally high-level to preserve operational security, without exposing sensitive details.

Home Lab photo

Home Lab rack photo

Infrastructure

Read the rack from top to bottom: network and security layer, compute/virtualization layer, then storage and backup power layer.

  • Middle section: virtualization host and services split by role (publication, administration, monitoring).
  • Lower section: primary storage, backup flow and power continuity to reduce service interruptions.

Network & flow diagram

Home Lab logical architecture diagram

Network & controlled publication

Traffic and publication principles

  • Usage segmentation to separate administration, internal services and exposed services.
  • Traffic paths restricted to what is strictly required per service role.
  • External publication centralized through a reverse proxy with a consistent exposure policy.
  • Conceptual separation between production environment and administration perimeter.
  • Documented approach to simplify maintenance and operational recovery.

Security, monitoring & continuity

Control and continuity baseline

  • TLS across published services, using Let’s Encrypt through the reverse proxy.
  • Restricted administrator access, with a VPN-only objective for sensitive operations.
  • SSH key-based authentication for system access.
  • MFA enabled where supported by services.
  • Continuous monitoring of service availability and health.
  • Operational alerting to handle incidents quickly.
  • Scheduled backups with regular restore testing.

Service status

Active monitoring

Public availability view of monitored services.