Hacker News new | past | comments | ask | show | jobs | submit login

Exactly. When you cross a certain complexity threshold, it's worth separating concerns. It's true for configuration, it's true for IaC, and also for authorization policy.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: