Damn good counter point. I guess the two cannot exist together, maybe having a separate physically isolated network only for developers to get the job done and then installing the result on the test machine can keep both happy.
On 19 November 2011 01:06, Ken Schaefer <k...@adopenstatic.com> wrote: > On the other hand, you just head over to the sysadmin lists and see the > admins complaining about how much time is consumed supporting developers who > get their machines compromised or otherwise borked. Putting unauthorised > networks into an environment is a huge no-no in my book. Most developers do > not have the skills or the knowledge to secure a network, let alone know what > regulatory/audit requirements the business has. Then, if there is a > compromise and corporate IP is stolen, customer information stolen etc. due > to ingress via an unauthorized network, who is going to take the rap? >