Damn good counter point. I guess the two cannot exist together, maybe
having a separate physically isolated network  only for developers to
get the job done and then installing the result on the test machine
can keep both happy.

On 19 November 2011 01:06, Ken Schaefer <k...@adopenstatic.com> wrote:
> On the other hand, you just head over to the sysadmin lists and see the 
> admins complaining about how much time is consumed supporting developers who 
> get their machines compromised or otherwise borked. Putting unauthorised 
> networks into an environment is a huge no-no in my book. Most developers do 
> not have the skills or the knowledge to secure a network, let alone know what 
> regulatory/audit requirements the business has. Then, if there is a 
> compromise and corporate IP is stolen, customer information stolen etc. due 
> to ingress via an unauthorized network, who is going to take the rap?
>

Reply via email to