You must log in or # to comment.
The most secure endpoint is one that is completely inaccessible because the underlying service isn’t running.
What I stand up in AWS I don’t know how it works. How an I going to expect a hacker to figure it out?
Devs:
I have altered the code. Pray I do not alter it any further.
Less documentation means more job security.
“Can’t expect me to train my replacement if I don’t remember how I did it!”
“It works. What more do you want?”
Ok but hear me out we’ll just put it in a Docker container and that’ll make it better