You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

  1. Use latest LTS stable versions 
  2. Use minimum run-time code, minimize the amount of software installed on the system. 
    1. If you don't intend to use a piece of software, then don't install it. 
    2. If you don't intend to use a service, stop that service and uninstall it. 
    3. If you no longer need a piece of software, uninstall it. 
    4. If possible, run each network service on a separate system to minimize the risk of one compromised service being used to compromise another service. 
  3. Delete all compilers once finished building the images
  4. Use git-secrets for id management 
  • No labels