I read this security guide and was thinking that many of the recommended steps could be modelled with Juju and included as a security layer in each charm: https://www.inversoft.com/guides/2016-guide-to-user-data-security
Maarten
-- Juju mailing list [email protected] Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/juju
