Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The relevant box here is "Are all accesses to production systems logged in an indelible manner?" and "Is the principal of least privilege followed when accessing production systems?"

These questions aren't perfect, since they don't actually prevent security issues and merely document them extensively, but answering no to them will fail the audit.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: