Measures to Promote Security
Measures
No external access to the system via SSH.
Aggressive networking stance. All connectivity is restricted to known peers/ports and maintained via infrastructure as code (IAC).
All egress traffic is filtered to known domains only. Deny by default.
Minimal public-facing infrastructure. Shielded by AWS-managed services where possible.
Production access is severely limited only to automatic processes and trusted operators.
CI/CD systems used to deploy infrastructure/applications. Peer review/approval for any new code entering production
Last updated