💾 Archived View for dioskouroi.xyz › thread › 29383475 captured on 2021-11-30 at 20:18:30. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
________________________________________________________________________________
Great list. A good addition would be to tell them to have proper network segmentation (or zero trust), which is a million times easier when you build from scratch than when you try to implement retroactively.
The centralized logging is great. Startups may not want to log gigabytes of network, endpoint and other logs, but having a process to onboard and offboard logs from a central repo is critical (this includes cloud!). If you don't have staff to look at the logs and do stuff with it, it just eats up precious money. But if/when you do, lacking infra/process will cripple any defensive security approaches that rely in it. Lastly, if you have a 3rd party vendor that takes your logs and does stuff with it, it is not a replacement to centralized logging! I've seen companies make this mistake time and time again and regret it. Own your logs just like you would own a copy of your accounting books.