Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>So how do we guard against this type of attack?

Only allow restricted CI servers to build and deploy production code.

Whitelisted list of software and security monitoring for CI servers so malicious software is harder to install.

Whitelisted list of software that developer machines can run (ie: no arbitrary third party code). Restricted docker containers for all local testing. There's a reason various companies do not give developers admin access to their machines.

edit: This or related concepts (SDLC, audit logs reviewed weekly, security team sign offs on system changes, etc.) are in my experience pretty standard in large enterprise security reviews for vendors that were high risk. The issue is that everyone probably lies and doesn't actually do any of these things even if they say they do. The incentives are set up to certify vendors rather than fail them.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: