• themaninblack@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    12 hours ago

    Dude thank you for your detailed reply which I have been thinking about for a while.

    I don’t want to mischaracterise what you’re saying but I want to try to summarise the lessons, which I think are super valid.

    1. Some external layers or services are basically essential, like a WAF/auth/rate limiter/API gateway/reverse proxy. Or DB.
    2. Observability and logging, and rapid response to anomalies, together with a honeypot, go a long way toward maintaining security.

    This is definitely a way to think about this that I haven’t distilled. Thanks!

    • adminofoz@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      8 hours ago

      Thanks! Glad it was helpful. I didnt have any similar realization until I had worked in the field for awhile amd honestly didnt have anyone to tell so i probably rambled. Good summary. Lean more into WAF, EDR and observability before a honeypot but yeah both are valid.

      Hope your talk goes well!