Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Besides delegating the secrets protection to entities that do it well, key rotation is a major benefit to ensure that in the likely event your credentials are leaked (either due to malpractice or a vulnerability) the attack surface will be shortened by the time they can be used by.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: