Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

We are using various tools to access security of our application. You can see various reports and practices we follow but not limited to at Security checklistChecklist

Database Access

Database access on aws is configured in such a way that, even application on AWS can not access database if it is not a part of designated security group.

...