TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Security 101 for SaaS startups

94 pointsby lumisotaabout 8 years ago

6 comments

winkabout 8 years ago
Previous discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13797834" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=13797834</a>
graystevensabout 8 years ago
I&#x27;m not sure if it&#x27;s the fact I work in the industry and therefore in a bit of an echo chamber, but almost every other story has a security angle these days - and that can only be a good thing, raising its awareness.<p>Whilst this list isn&#x27;t perfect, it&#x27;s certainly a good starting block. Oh, and obviously these suggestions aren&#x27;t just for start ups! It&#x27;s nice seeing about the risk of &#x27;insider threats and data leakage&#x27; being brought up, seeing as I&#x27;m working on a service in these areas.
nodesocketabout 8 years ago
Security is a huge concern for companies and largely executives who typically aren&#x27;t as technical. It keeps them up at night, mainly because they can&#x27;t control it and to a certain extent they don&#x27;t understand a lot of the technical details and attack surfaces.<p>In January I founded a DevOps and infrastructure consulting startup (shameless plug <a href="https:&#x2F;&#x2F;elasticbyte.net" rel="nofollow">https:&#x2F;&#x2F;elasticbyte.net</a>) and security audits and best practices is one of the top &quot;value&quot; adds of my service. I don&#x27;t claim to be a crypto expert or DevSec guru, but most of the issues aren&#x27;t deeply technical problems like what CloudFlare experienced. Usually it just takes rigor and following best practices, firewall rules, don&#x27;t share keys and passwords, two factor auth, use IAM, use jump hosts, if a server doesn&#x27;t need public access don&#x27;t provision a public address. Isolate services and dev and staging environments.
评论 #13816619 未加载
jbaviatabout 8 years ago
For a more checklist oriented approach you might also find this other list helpful.<p>It is a reminder of all measures you could take, at a higher level, about technical as well as cultural things you need to do about security.<p><a href="https:&#x2F;&#x2F;cto-security-checklist.sqreen.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;cto-security-checklist.sqreen.io&#x2F;</a><p>Full disclosure: I worked on it (feel free to send me feedback)
twakefieldabout 8 years ago
&quot;Once your sales starts selling to large customers, they would report back on compliance requirements and certifications related to security.&quot;<p>And get ready for the questionnaires, each different enough to maximize the time spent on them. The Vendor Security Alliance[0] is attempting to standardize them. Although, I&#x27;m not sure how much uptake it&#x27;s getting. At a minimum, it&#x27;s a good example of a typical questionnaire.<p>[0] <a href="https:&#x2F;&#x2F;www.vendorsecurityalliance.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.vendorsecurityalliance.org&#x2F;</a>
评论 #13816871 未加载
lykronabout 8 years ago
&quot;A third domain is needed for internal use and back office. This domain would probably be registered anonymously, so it would be a little more difficult to find.&quot;<p>Um, security through obscurity is not security. And I don&#x27;t get this? Are we talking Active Directory? It can be a subdomain off your root domain that is only accessible internally.
评论 #13816714 未加载