We use cookies to make your experience better.
There’s a spectrum of security requirements for development environments. And there’s a variety of security measures to meet those requirements, from cloud repos with public package repositories to air-gapped, 100% offline setups. Coder supports these and several security measures in between.
Another advantage of Coder’s platform agnosticism is letting you configure your development infrastructure to meet your security requirements. You do this by using your preferred OS, runtime and orchestration platforms, cloud providers, an on-premise hardware. In our August webinar, Tim Quinlan, Coder’s Senior Technical Marketer, gives detailed advice on securing your development environments.
Security in dev environments can be seen as a spectrum, from low to high. The higher on the spectrum, the greater the need for protection. This spectrum helps you choose the right security measures for your developer infrastructure:
There are a few techniques that you can choose to implement with Coder for controlled and isolated security. Coder itself already follows industry-standard security practices. You can harden your environments even more by reducing your infrastructure’s exposure to outside services:
Coder supports a wide range of security measures for development environments, from public access to high-security air-gapped self-hosting.
You can find out more about securing development environments by watching the webinar. Register here.
And you can join our other webinars on cloud development environments and Coder, live and on-demand.
Enjoy what you read?
Subscribe to our newsletter
By signing up, you agree to our Privacy Policy and Terms of service.