Skip to content

Security

Brandon Orther edited this page Sep 2, 2017 · 1 revision

Information related to securing our company's secrets and infrastructure.

Intro

The tools and practices we use to secure our company's resources rely on public-key cryptography. An example of public-key cryptography is using ssh keys to authenticate. The use of SSL certificates in browsers is another.

Using keys to secure sensitive data and systems is a lot less complicated that many believe. A basic high-level understanding of how public-key cryptography works and how it is most often used is all the average developer really needs. The following article provides just that and I highly recommend it:

The follow sections will provide concrete guides on how we handle security.

Tools

TODO

  • 1Password
  • password-store
  • gopass
  • keybase.io

Clone this wiki locally