Hacker News new | past | comments | ask | show | jobs | submit login

Meh, just do it like me get hardened image and container. Deploy stuff as a gold image without elevated permissions and or container. Then just make sure everything is behind a proxy or intelligent load balancer that restricts any crazy input.

DONT OVERCOMPLICATE WORK

Overcomplicating work means slower response times to solving problems.




Can you give examples of hardened images?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: