Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From reading the developer anecdotes in here I think it’s worth mentioning that if just one person can bring down the whole enterprise, a hacker only needs a point of entry to do the same.

For our databases we have separate credentials, compartmentalized access and disallowed “dangerous” commands. This now seems like obviousness, but we only got this years in. Thankfully, no (major) incidents have occurred to this date.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: