Log4j: Vulnerability Diagram

Great diagram of the vulnerability and how to prevent it on each of the stages. Full article here.

The log4j JNDI Attack
Published by Jordi Vilanova, Cloudtango