Ask HN: Does your firm have a godmode/impersonation tool to mimic user accounts?
What's your take on these god-mode tools? I fear that most of them don't have good security, audit-trails/changelogs, or permission management etc etc. Have any of you seen a good implementation of this? If not, how does your company ensure that these tools do not end up creating security breaches?
No comments yet.