Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

To manage insider risk, we do everything you mention (as well as much more I can’t mention). We treat insider risk the same as external threats: ever present and requiring constant vigilance.

The VM is not considered a security boundary any longer; tenancy controls are now in place, to prevent attacks similar to Meltdown and Spectre that are yet undiscovered.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: