Slide 19
Slide 19 text
Assume the worst
• Use the tools at your disposal
• Your own audits
• Log logins, failed logins, account changes (password changes, email changes), confirm
db transactions…
• have thresholds on logins from an address, db connections, queries per second
• DoW
• Chaos engineering
• Improve testing
• Rotate credentials
• Separate credentials and policies for different functions
• Remove unused functions
• Harden accounts and environments
• Automate your controls