dcrayf...@gmail.com (David Crayford) writes: > I think the general ROT for those kind of systems is that the network > defines security. All back-end services should be hidden behind > firewalls and not accessible to the outside world. It's a different > world these days where everything seems to run on docker images > orchestrated by something like kuebernetes and secured by LDAP or > whatever. Nobody dishes out userids unless you need admin.
Skip containers and do serverless computing instead; Container technologies like Docker are very powerful, but require talent you can't get. Serverless computing provides the same benefits -- with talent you can actually get https://www.infoworld.com/article/3265457/containers/why-serverless-is-the-better-option-than-containers.html we had worked with several people at Oracle on cluster scaleup ... part of getting cluster scaleup being transferred were mainframe DB2 complaining if I was allowed to continue, it would be at least 5yrs ahead of them. Over a period of a few weeks, cluster scaleup was transferred, announced as IBM supercomputer (for technical/scientific *ONLY*) and we were told we couldn't work on anything with more than four processors. we leave a few months later. past posts http://www.garlic.com/~lynn/subtopic.html#hacmp not long later, we are brought in as consultants by two of the (former Oracle) people we had worked with ... who were then at a small client/server startup responsible for something called commerce server, the startup had also invented this technology they called "SSL" they wanted to use, the result is now frequently called "electronic commerce". As webservers got more complex, there was increasing number of RDBMS-backed servers (compared to flat-file based implementations) that had significant larger number of exploits. Part of it was RDBMS were much more complex & corresponding increase in mistakes (along with rapidly exploding demand for scarce skills). A specific example was they would disable all outside connections for RDBMS maintenance ... and during maintenance they would relax various security processes. Complexity of RDBMS met that increasingly likely they would overrun maintenance windows, in mad rush to get back online they would frequently overlook reactivating various security processes. more recent https://en.wikipedia.org/wiki/SQL_injection all of these have web application with access ... and attacks are typically against the web application (where webserver frontends are also responsible for access control). -- virtualization experience starting Jan1968, online at home since Mar1970 ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN