Wander Logo

Wander Engineering

  • Career Paths
  • Code Reviews
  • Code Standards
  • Security
  • Workflow
  • Working at Wander

    Security

    Employees must take every reasonable measure to protect Wander's technology.

    Additional instruction will be provided during on-boarding or from your team lead, but here are the basics.

    Passwords, Tokens, and Secure Credentials

    • Any passwords, tokens, or secure credentials must be stored in a password vault (i.e. Apple Keychain, 1Password, etc.). No sticky notes, notebooks, plain text files, etc.
    • When creating accounts with 3rd-party services, if available, use Wander's Google Single Sign-On (SSO).
    • Enable and use two-factor authentication at every opportunity.
    • DO NOT commit any sensitive data to a code repository.
    • DO NOT use Slack or Email to share sensitive data. Approved methods will be shared at on-boarding.
    • Employees should avoid retaining secure credentials or service permissions when possible.

    Work Computer

    The computer you use for work must have the following:

    • Password login
    • FileVault or other disk encryption
    • Up to date with all security patches