Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Most attacks are done via local file access. Ship things over an API.

EC2 -> S3 bucket with only write access and versioning enabled. EC2 -> EFS and it's a rotating set of 7 with 7 different security groups that rotate.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: