The Lord of the Rings and Information Security in Your Open Source Project


From time to time, communities will run across information security incidents. In the course of project expansion, it always seems like a good idea to wake up a new instance of Something_With_A_Database and not write down the credentials or think very clearly about what the permissions are on that new instance. If you’re involved in open source for any length of time, you’re going to discover a hack at some point in time. However, the Lord of the Rings is a great model for being able to deal with your information security issues.

Speaker

amye-scavarda

Amye Scavarda

 

Implementer of sanity in fast-paced chaos. Pleasant, cheerful and competent in a sea of snark. I’m at Red Hat as their Gluster Community Lead. I help feed and water the Gluster.org community. Previously, I was a Drupal and DevOps project manager, expanding out the world one little website + infrastructure build at a time.