logoalt Hacker News

mycallyesterday at 8:06 PM0 repliesview on HN

Perhaps those companies should have performed verified backups of third-party vendor's published security policies into a secure enclave with paired keys with the auditor, to keep a trail of custody.