If you like DNray Forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...

 

How to Safely Provide Data to Programmers

Started by Weerabocuour, Aug 16, 2023, 12:01 AM

Previous topic - Next topic

WeerabocuourTopic starter

Hello, my name is Tom and recently I had an idea to create a website. Despite not being a programmer myself, I managed to find a skilled freelancer who efficiently completed the job. However, I'm now concerned about the security of sharing data from hosting with other programmers in the future. It's a possibility that I may need to work with new individuals if my trusted contact is unavailable. I worry that handing over access to the hosting and server where the site is located could result in theft of important files or the insertion of malicious code aimed at extracting money from the balance.

I would appreciate hearing your experiences and knowledge on this matter. Especially, if you are aware of how programmers in reputable companies, such as top banks or stock exchanges, ensure file security despite the tempting circumstances they may face.
  •  


goolemype98

When it comes to sharing access to hosting and servers with new individuals, there are a few best practices to consider:

1. Limited Access: Grant access only to the specific resources necessary for the individual to carry out their tasks. Restrict access to sensitive files and databases whenever possible.

2. Role-Based Access Control: Implement role-based access control to ensure that each user has appropriate permissions based on their responsibilities. This helps prevent unauthorized access to critical components of your website.

3. Two-Factor Authentication: Enable two-factor authentication for all users accessing the hosting or server environment. This adds an extra layer of security by requiring both a password and a unique verification code.

4. Regular Audits: Conduct regular audits of access logs and activity to monitor for any suspicious behavior or unauthorized access attempts. This helps you detect any potential security threats early on.

Reputable companies, like banks and stock exchanges, have even more stringent security measures in place due to the sensitivity of the data they handle. These may include network segmentation, encryption of data in transit and at rest, intrusion detection systems, regular security testing, and comprehensive employee training on security practices. They often have dedicated IT security teams and follow industry security standards and regulations.

It's important to have a conversation with any new programmers you work with about your concerns regarding data security. Make sure they understand your expectations and establish clear guidelines for handling sensitive information. Additionally, consider utilizing legal agreements, such as non-disclosure agreements (NDAs), to protect your intellectual property and proprietary information.
  •  

diy05

Follow the terms of the agreement.
Implement a system for managing versions.
Restrict access to the live server.
Deploy the website efficiently by utilizing Docker on local machines or maintaining a dedicated development server.

Promote the release of completed features to the main server, but only entrust this task to reliable individuals (and certainly not through insecure protocols like FTP or SSH).

Ensure timely payment to developers and offer compensation that motivates them to deliver exceptional work.
  •  

ichnolite

If I were to be presented with such a question (which has not yet been asked), I would contemplate it. There exists no safeguard whatsoever. Neither version control, nor archives, nor intricate distribution plans (development server, testing, worker) will shield you from all the perils.

Naturally, everything hinges upon what you do. It is possible that a mundane act of data theft from a single DBMS table could be sufficient to bring the entire endeavor crashing down.

Furthermore, there is a distinction as to what purpose a person is required for. If there are doubts about the individual/situation, it is necessary to grant precisely the amount of rights that allow for the completion of the task. But how can one determine this (regarding the minimum necessary rights)?

Take a moment to ponder, in order to momentarily divert your attention, about how you would protect your own PC or laptop from illegal actions. Observe how the protective measures evolve based on the risks entailed. Personally, I once encrypted my hard drive, purely to ensure that in the event of theft, my data wouldn't become public. There are simpler risks (such as questionable guests attempting to guess passwords from the PC keyboard). However, there is a solution for every risk, ranging from keys for the PC case to more intricate systems.

Websites and Internet businesses face their own set of risks. If you believe that stock market ratings or an employment contract will safeguard you from all the world's threats, you are mistaken.
  •  

makloy143

Smart setups enforce zero-trust architectures: RBAC, immutable infrastructure, and continuous monitoring. Don't just hand over SSH keys or cPanel logins - containerize, enforce least privilege, audit trails, and sandbox environments.

If you're not codifying your infra, you might as well gift-wrap your data to rogue devs. No excuses - use GitOps, CI/CD pipelines, and automated security scanning. Your trusted contact will thank you, and future freelancers get only the access they need - not the keys to your kingdom. Stay paranoid; assume breach.
  •  


If you like DNray forum, you can support it by - BTC: bc1qppjcl3c2cyjazy6lepmrv3fh6ke9mxs7zpfky0 , TRC20 and more...