Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I’m curious what sorts of things were on the checklist. I wonder if it’s something they will share proactively?


It's been a few years, so I'm going off of memory, but it was mostly best practices stuff (enabling Cloudtrail, rotating older keys, etc). Anything to ensure that once the attackers no longer had access, removing/monitoring anything that would have longer term implications.


this makes sense; plug the hole and stop taking on water before you ask for a free cleanup.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: