| ▲ | rithdmc 3 hours ago | |||||||
It's the principle of 'Defence in Depth'. Do both, as one control may fail. | ||||||||
| ▲ | amiga386 an hour ago | parent [-] | |||||||
But you wouldn't, or shouldn't, take a patchwork approach to it. If the software you're trying to secure actually depends on a full, working, intertwined unix system... you leave that as it is. You can certainly try reducing a process's access to the system it's running on (whether that be by containers, jail(8), SELinux, AppArmor, etc.), but you don't go around deleting 7-zip or your scripting languages or compilers, on the off-chance that'll thwart a hacker. Sure, you can say, "defense in depth", but if you have one layer that's actually holding up the security guarantees, and a second layer that is largely ineffectual (haha! I removed /bin/cat, now they can't read files! oh and base64 too... and yyencode... and... and... and...), I wouldn't waste much time on the second layer. | ||||||||
| ||||||||