Answer the question
In order to leave comments, you need to log in
How do you provide programmers with access to the source code and personal data of users?
Hey!
We have several projects: a couple of online stores, a small social network. It was developed by me and people whom I fully trusted. Therefore, in development (on the dev-server and local machines), we, as a rule, used real user data, i.e. used a dump from the production server in daily work.
Now I want to take more remote employees into the project and I don’t want to give access to this data to the first person I meet. And, looking back, it’s not at all secure to use user data in development. Not to mention the fact that you can fall under a feil - such as sending a letter to a user from a dev server :)
How do you solve this problem in your company?
So far I've found two ways to solve the problem:
Answer the question
In order to leave comments, you need to log in
The second option is with the replacement of personal data with fictitious values. The full name and the name of us are changing. item. But protection is not from unscrupulous employees, but from the option when they come with a check (but there is no license and consent to the processing of personal data)
Depending on what for:
In the early stages of development - a data generator or a fish.
At the support stage, there is depersonalized real data, because users come up with things that normal people cannot always foresee.
And you should not try to stop access to real data. The programmer holds the code in his hands and can insert anything into it and get the appropriate access. This is a trust issue that needs to be addressed immediately. As a last resort, set up site monitoring to detect unauthorized access.
There is access to everything, but every 2 years we go through a lie detector.
at one time they had fun with such a "add-on" over php, which allowed each programmer to be given access to their personal directories: one is available from the web, the other is only for php.
if memory serves, all executable files of programmers were included inside the function, due to which a local namespace was created for each file. plus programmers' files were checked for the occurrence of the names of some functions that were locked (more precisely, there was a list of functions allowed for use - so the list is shorter, you understand).
file access: with chmod.
regarding access to the database: as in many frameworks, there was a base for development and a base for production. the second was accessed by a couple of truly trusted techies.
this was done more for home use. I am sure that there are much more serious and interesting developments.
you can fall under a feil - like sending a letter to a user from a dev-server :)
On the election project, we kept all personal information in encrypted form. And the rest, when the dev server was updated, they ran a script where all soaps became user[ID] localhost .com, and all surnames became Smith, Anderson and so on :)
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question