Ok, here's the situation. Contracting to a large outsourcing company supporting one of their customers. For one of the projects I designed a multi tiered dmz infrastructure for a new fancy web channel. All nice and as secure as it could be on the given budget. The end client co has now made requests to accesss said server infrastructure in non-secure (and very stupid) ways that will turn my nice secure setup into a colander. Accessible from everywhere inside client co and from remote VPN connections without restrictions.
This is something I know is stupid, the people here know its stupid, even some of the managers at the client co know its stupid but still they are persisting. The manager in question doesn't want the bother of hoping from another controlled (jump off) server (apparently that takes too long !!!!!!)
Hence my question in the title .... Where do you draw the line?
Do you refuse to do the work and argue till your blue in the face (aren't we supposed to be the experts??) or just simple go ahead and do something you know will no doubt come back to bite you in a matter of weeks.
This is something I know is stupid, the people here know its stupid, even some of the managers at the client co know its stupid but still they are persisting. The manager in question doesn't want the bother of hoping from another controlled (jump off) server (apparently that takes too long !!!!!!)
Hence my question in the title .... Where do you draw the line?
Do you refuse to do the work and argue till your blue in the face (aren't we supposed to be the experts??) or just simple go ahead and do something you know will no doubt come back to bite you in a matter of weeks.
Comment