<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Legacy on Lukas Manera</title><link>https://blog.xarc.dev/tags/legacy/</link><description>Recent content in Legacy on Lukas Manera</description><generator>Hugo</generator><language>en-us</language><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener"&gt;CC BY-NC 4.0&lt;/a&gt;</copyright><lastBuildDate>Tue, 07 Apr 2026 00:17:55 +0200</lastBuildDate><atom:link href="https://blog.xarc.dev/tags/legacy/index.xml" rel="self" type="application/rss+xml"/><item><title>Playbook for Hardening Legacy PHP</title><link>https://blog.xarc.dev/posts/2026/04/playbook-for-hardening-legacy-php/</link><pubDate>Mon, 06 Apr 2026 12:00:00 +0200</pubDate><guid>https://blog.xarc.dev/posts/2026/04/playbook-for-hardening-legacy-php/</guid><description>&lt;p&gt;This is my practical follow-up to my post on &lt;a href="https://blog.xarc.dev/posts/2026/04/hardening-legacy-php-in-constrained-environments/"&gt;threat modeling legacy PHP in constrained environments&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;That post is more about mindset, prioritization, and how to think about risk when the system is messy but the business relies on it.&lt;/p&gt;
&lt;p&gt;This one is the hands-on version. It is the kind of outline I come back to at the start of a new project where the codebase is fragile, the DevOps story is rudimentary at best, and nobody is getting six months to clean things up before security work starts.&lt;/p&gt;</description></item><item><title>Hardening Legacy PHP in Constrained Environments</title><link>https://blog.xarc.dev/posts/2026/04/hardening-legacy-php-in-constrained-environments/</link><pubDate>Sun, 05 Apr 2026 12:00:00 +0200</pubDate><guid>https://blog.xarc.dev/posts/2026/04/hardening-legacy-php-in-constrained-environments/</guid><description>&lt;p&gt;The moment you realize that the roughest codebase you’ve seen is also one of the most valuable systems you’ve touched, things start to look a little different.&lt;/p&gt;
&lt;p&gt;“Just modernize it” is not a security strategy if the main thing that matters is keeping core business processes running in a system that drives major revenue.&lt;/p&gt;
&lt;p&gt;If you get called into an old PHP application, it can feel a bit like arriving at a crash site. After the initial shock, instead of judging, you start to think like an emergency responder: assess the scene, stabilize what matters most, and reduce the risk without making the situation worse.&lt;/p&gt;</description></item></channel></rss>