▲ | viraptor 3 days ago | |||||||||||||||||||||||||
> In practice, attackers often find ways around those measures I really don't see this as a good explanation. You can say that about any security measure, but we can't keep slapping more layers that check the previous layer. At some point that action itself will cause issues. > for example, through misconfigured deployments, command injection, supply chain attacks, or overly broad privileges. Those don't apply if the file owner is not the app runner or the filesystem is read-only. If you can change the file in that case, you can disable the check. Same for misconfiguration and command injection. > For example, PCI DSS Ah, BS processes. Just say it's about that up front. | ||||||||||||||||||||||||||
▲ | chucky_z 3 days ago | parent | next [-] | |||||||||||||||||||||||||
I've used FIM in the past to catch a CEO modifying files in real-time at a small business so I could ping him and ask him to kindly stop. It's not just about BS _processes_. :D | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
▲ | catatsuy 2 days ago | parent | prev [-] | |||||||||||||||||||||||||
Compliance is definitely one use case, but not the only one. It’s also useful for catching unexpected local changes in real-world operations. The goal is to provide a lightweight FIM that can be added to existing apps without too much friction. |