▲ | sophacles 6 days ago | |||||||
> Why would one task run in a drastically different architectural situation Someone made a mistake. These things happen. > and it happen to be the one exploited? Why would the vulnerable service be the service that is exploited? It seems to me that's a far more likely scenario than the non-vulnerable service being exploited... no? | ||||||||
▲ | bigiain 6 days ago | parent [-] | |||||||
> > Why would one task run in a drastically different architectural situation > Someone made a mistake. These things happen. Some company didn't have appropriate processes in place. For ISO27001 certification you at least need to pay lip service to having documents and policies about how you deploy secure platforms. (As annoying as ISO certification is, it does at least try to ensure you have thought about andedocumented stuff like this.) | ||||||||
|