Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To be honest I think if you're responsible for running production systems, it would be a no-brainer to run everything as closed up as it gets, with only access from servers which actually need it.


Yet we see security breaches caused by trivial misconfigurations and bad (or no) firewall setups. Chances are, people building these systems aren't accustomed to security-first deployment and will use and bookmark a guide like this to properly set up instances, rarely if ever going back to the docs or looking at other guides.


Chances are, people building these systems aren't accustomed to security-first deployment and will use and bookmark a guide like this to properly set up instances

Or they aren't given the time, running on ASAP-brand project management and/or pushing the POC to prod.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: