Summary
Now, let’s review what we’ve covered in this chapter. We have gone way beyond the base configuration of LUKS from common Linux installers. We have reviewed advanced ways of automating LUKS to improve security and the end-user experience; we have also covered more advanced ways of configuring the encryption keys and passphrases; and finally, and just as importantly, we have covered preventative measures with multiple keys and passphrases to virtually eliminate the probability of data loss during a critical support issue. I hope you have enjoyed this deep dive into LUKS as much as I have.
The benefits of leveraging this kind of encryption automation are extensive. In doing this, you will immediately create a better end-user experience as they will not be forced to memorize or type the passphrase every boot cycle. This implemented encryption protects your appliance and your end-customers' data or intellectual properties. Having this strong encryption gives...