logoalt Hacker News

mcmcmcyesterday at 10:10 PM1 replyview on HN

Let’s not forget the third option: proper security practices and principle of least privilege. No one should have been able to do this in the first place. Why were they able to get plaintext passwords with a simple query? Why did they have delete permissions on production db tables? Why were they able to modify system logs and delete backups?


Replies