top | item 43034855

(no title)

ianpurton | 1 year ago

You need to take a Defence in depth strategy.

There are various ways to validate libraries but it's best to assume an exploit gets through.

So then, you should be looking at your deployment, i.e. locking down containers, network policies, least privileges etc etc.

Try to reduce the blast radius to zero.

discuss

order

No comments yet.