Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From a security perspective, you remove the possibility of exfiltration of client data, especially PII or other sensitive data. Many orgs that have to work with PII already have strict controls around them, but that usually means that the company installs crapware on dev machines.


Exactly! Either developer laptops are part of the network that has access to lots of very sensitive data (and get treated accordingly) or they aren't. There's no sane middle ground where developers have infinite free reign and root on their laptops while also doing dumps from production databases of PII.

There are a lot of situations where people tolerate less sane practices because they are convenient, but this isn't a good strategy.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: