Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

You need to take a Defence in depth strategy.

There are various ways to validate libraries but it's best to assume an exploit gets through.

So then, you should be looking at your deployment, i.e. locking down containers, network policies, least privileges etc etc.

Try to reduce the blast radius to zero.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: