Only impersonate on operations that require it

J.D. Meier, Jason Taylor, Prashant Bansode, Carlos Farre, Madhu Sundararajan, Steve Gregersen.

Only impersonate specific operations that require it. If you impersonate on operations that do not require the additional privileges you are increasing your attack surface as well as the potential impact of an exploit.

Last edited Apr 16, 2008 at 11:43 PM by prashantbansode, version 1

Comments

No comments yet.