This will be a living document with tips and trips to securing your full node, harvester and wallet. There are many options being discussed right now, but I will not be recommending them without evidence that they are properly secure.
What is security? Security, in the information security domain, is a state and process enabled by three sides, called the Security Triangle. The three foundational elements of Security are Integrity, Availability and Confidentiality. When most people discuss “security” they are focused entirely on confidentiality to the exclusion of trust and reliability. You can encrypt your wallet mnemonic and throw away the key but by doing so does not improve security. It makes the wallet perfectly confidential at the expense of scrambling the contents and losing access to it forever. So in order for a solution to be secure it must ensure that the data does not change, that you have access to the data and that only you have access to the data. From that perspective, we are going to explore a number of topics related to Chia security.
It is a good idea to start with Threat Modelling, as all security decisions are made in the context of threat and risk, and each component to your setup will have its own unique threats. We then discuss mitigation of those threats and what you can do to improve your security posture.