TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

How to secure anything

188 点作者 arberavdullahu大约 3 年前

7 条评论

dsr_大约 3 年前
This is missing an extremely important upfront concept: you need to know what you&#x27;re protecting and how valuable it is.<p>It does no good whatsoever to require every user of a grocery-list app to have a Yubikey to verify their identity. It might not even make sense to have users login at all.<p>The balance between usability and security must be consonant with the costs of implementation.
评论 #30435702 未加载
评论 #30439024 未加载
评论 #30434596 未加载
AtlasBarfed大约 3 年前
Already makes the crucial mistake:<p>Security people always want to &quot;set policy&quot; &quot;educate on practices&quot; and &quot;enforce&quot;. You&#x27;ve already lost the battle.<p>PROVIDE SOLUTIONS. Why recommend all this &quot;policy&quot; when what you need to do is provide, at a minimum, a reference implementation. If you get called in as part of security architecture, PROVIDE A SOLUTION.<p>Because if you don&#x27;t the devs will do the absolute minimum, and likely will have backdoors galore, especially as your policies impose real restrictions on their systems support quality of life, ability to respond to production issues, and iterate to produce features.<p>The other persistent issue with security is that it is anathema to automation, and therefore efficiency. So dovetailing with providing a solution, these practices for 2FA and SSO (which invariably involves horrible popup UIs and other hacky things) will block, say, automated backups, auditing, monitoring, etc that also require access. So be ready with those.
评论 #30439759 未加载
评论 #30438991 未加载
deathanatos大约 3 年前
But how do I actually <i>do</i> any of this.<p>E.g., in Azure, in theory, we should PoLP the access controls. But Azure&#x27;s tutorials and guides often recommend using Contributor (Azure role that entails access to almost everything, except granting more access), and which permissions an API call requires is, AFAICT, undocumented. And sometimes, the error doesn&#x27;t tell you.¹<p>I want to allow SSH into systems. Copying keys about the landscape is one employee departure away from having keys on systems that don&#x27;t need to be there. The last time I set up LDAP … I had to learn about object classes, and some sort of object-oriented tree database when all I <i>want</i> is a list of users &amp; perms. (I understand LDAP&#x27;s design better now, and I even like it, but it the onboarding is braindeath.)<p>There are any number of k8s dashboards that would give my coworkers better vis … and basically none that have an auth story.<p>The examples are endless.<p>¹heck, sometimes the error isn&#x27;t even grammatically correct English.
评论 #30439051 未加载
mooreds大约 3 年前
If you are interested in this topic, can&#x27;t recommend this book enough: <a href="https:&#x2F;&#x2F;www.cl.cam.ac.uk&#x2F;~rja14&#x2F;book.html" rel="nofollow">https:&#x2F;&#x2F;www.cl.cam.ac.uk&#x2F;~rja14&#x2F;book.html</a><p>The 3rd edition is expansive (1000 pages, plenty of references) but readable. Free PDFs of previous editions are available at that link.
评论 #30439327 未加载
1970-01-01大约 3 年前
This list comes up often without discussion:<p><pre><code> https:&#x2F;&#x2F;news.ycombinator.com&#x2F;from?site=github.com&#x2F;veeral-patel </code></pre> It&#x27;s a nice list, but still missing core concepts such as backups and system availability.
fulafel大约 3 年前
These are about adding stuff. The overwhelmingly sost effective way to secure things is to simplify them until you have good confidence you understand the thing as a whole which enables you to reason about its security properties on a much better level with high confidence, and enable other people to do the same.
jnalley大约 3 年前
Pretty good anthology of info here, but, no commits in over a year ?
评论 #30438997 未加载
评论 #30434945 未加载