I read this security guide and was thinking that many of the recommended
steps could be modelled with Juju and included as a security layer in each
charm:
https://www.inversoft.com/guides/2016-guide-to-user-data-security

Maarten
-- 
Juju mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/juju

Reply via email to