Features

What makes NubiferOS the secure choice for cloud engineers

NubiferOS is built for cloud engineers who manage multiple accounts and need security they can trust. Here's what sets it apart.

Security by Default

These components are always installed and cannot be disabled. They form the security foundation.

ComponentWhat It DoesWhy It Matters
LUKS Disk EncryptionEncrypts entire disk with AES-256Laptop stolen? Data unreadable.
GPG + passEncrypts credentials at restNo plaintext ~/.aws/credentials
FirejailIsolates workspacesProd credentials invisible to dev workspace
WaylandModern display serverApps can't keylog each other
AppArmorLimits application accessCompromised app can't escape

β†’ Learn more about security architecture

Encrypted Credentials

Traditional setups store credentials in plaintext files. NubiferOS doesn't.

# Traditional (INSECURE)
cat ~/.aws/credentials
# Shows plaintext keys to any process

# NubiferOS
cat ~/.aws/credentials
# File doesn't exist - credentials in GPG-encrypted pass store

When you run aws s3 ls, our CLI wrapper:

  1. Fetches credentials from encrypted pass store
  2. Injects them directly into the CLI process
  3. Logs the access for audit

β†’ How credential security works

Workspace Isolation

Each workspace runs in isolated Linux namespaces via Firejail:

What's IsolatedSecurity Benefit
FilesystemEach workspace sees only its own credentials
ProcessesCan't see or signal other workspace processes
IPCNo shared memory attacks between workspaces

β†’ How workspace isolation works

Read-Only Mode

Lock workspaces to prevent destructive operations:

# Lock workspace (no sudo needed)
nubifer-workspace ro
# Or use the shortcut: nw ro

# Unlock for 15 minutes (requires sudo, auto-reverts)
sudo nubifer-workspace rw -d 15
# Or: sudo nw rw -d 15
ModeIndicatorBehavior
Read-OnlyπŸ”’ RO (green)Destructive commands blocked
Read-WriteπŸ”“ RW (red)All commands allowed

β†’ Workspace management guide

Security Dashboard

Monitor your security posture:

CheckWhat It Verifies
CPU MitigationsSpectre, Meltdown, RETBleed protection
Disk EncryptionLUKS enabled and configured
Network SecurityFirewall active, default-deny policy
Credential StatusVault status, credential count
# Launch dashboard
nubifer-dashboard

# Quick CLI check
sudo verify-security

Cloud Tools (50+)

Choose what you need during installation. Don't need Azure tools? Don't install them.

CategoryExamples
Cloud CLIsAWS CLI, Azure CLI, gcloud
Infrastructure as CodeTerraform, Pulumi, Ansible
Containers & K8sDocker, kubectl, Helm, k9s
CI/CD & GitOpsGitHub CLI, ArgoCD, Flux
IDEsVS Code, IntelliJ, PyCharm

β†’ Full tool list

Battle-Tested Tools

We use proven, audited toolsβ€”not custom implementations:

ToolPurposeIn Use Since
GPGCredential encryption1999 (25+ years)
passPassword management2012
FirejailApplication sandboxing2014
AppArmorMandatory access control2007
LUKSDisk encryption2004

Privacy First

AspectNubiferOS Approach
TelemetryNone. Zero data collection.
Network callsCredentials never leave your machine
External servicesNo cloud dependencies for security
AuditAll code is open source (GPL-3.0)

Get Started

Download NubiferOS Quick Start Guide

Learn More

TopicLink
Why NubiferOS?How we compare to alternatives
Security ArchitectureDefense-in-depth details
Built with AIOur AI-assisted development story
AboutProject philosophy and roadmap