Skip to content

Security best practices #492

@cyyynthia

Description

@cyyynthia

ThIs DoEs NoT fOlLoW BeSt PrAcTiCeS pLs Fix


The idea is not to adopt all the niche practices hyped by people who are chronically online on LinkedIn, nor configure crazy setups like we're about to deal with state secrets. It's not part of the threat model ;)

The scope of this issue is to adopt industry-standard practices, sprinked with some of yours truly's opinionated choices when it comes to infrastructure.

Metadata

Metadata

Assignees

Labels

opsRelated to operations: CI/CD, scripts, server configuration, and monitoring

Type

Projects

Status

Backlog

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions