LOL

That will work, especially since most of the developers will stop
developing. :)






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market…*

* GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A


On Thu, Dec 17, 2015 at 11:32 AM, Webster <[email protected]> wrote:

> COBOL on punch cards? J
>
>
>
>
>
> Old Fart Webster
>
>
>
> *From:* [email protected] [mailto:
> [email protected]] *On Behalf Of *Andrew S. Baker
> *Sent:* Thursday, December 17, 2015 11:03 AM
> *Subject:* [NTSysADM] Protecting Sensitive Source Code
>
>
>
> Good morning:
>
>
>
> Does anyone happen to have any experience with the protection of sensitive
> source code?
>
>
>
> Essentially, we're looking to ensure that we can adequately mitigate the
> risk of critical portions of the code being copied and used inappropriately.
>
>
>
> This is beyond any protections (real or imagined) offered by the
> following, which we have in place today:
>
>
>
> -- An NDA
>
> -- Restricted access to the source code repository, on a need to know basis
>
> -- Two-factor authentication to access the repository (being considered)
>
>
>
> ​An air-gapped network is not currently on the table for discussion. :)​
>
>
>
> ​Regards,​
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
> * GPG: *1AF3 EEC3 7C3C E88E B0EF 4319 8F28 A483 A182 EF3A
>

Reply via email to