Behaviour and protocol

Code Code reviews Consulting 101 Feedback Good meetings practices How to facilitate team meetings Inclusive language Values

Career

360 review Continuing education policy Engineering manager career ladder Roles Software engineer progression framework Technical skills sheet

Employee manual

Abtion's pomodoro Employee benefits Internal days & community Intro Parental leave policy Safety and security Schedule, time tracking & calendar Sickness & unplanned absence Travelling Vacation & planned time off Work from anywhere policy

Project management

Technical setup when starting a new project Client discontinuing hosting or sla Converting projects from development to maintenance mode Estimating Estimating project maintenance Go live checklist Handoffs Invoicing guidelines Procedure for traffic

Setup

Audio setup Create amazon bucket Database backup setup Gpg signing Pairing setup

Technical practices

Bug triaging Css How and why we do design research Kick off meeting Pair programming Tdd testdriven development Workflow

Templates

Readme.standard

Tools and services

Access and permissions Purchasing licenses and memberships Sharing sensitive information Stack and services Wordpress
Logo
=

Tools and services

The basic rules and culture:

We educate ourselves to be our own gatekeeper. Everyone is actively contributing.

  • When asking for access to e.g. Heroku or 1Password vaults ALSO ask to be removed after a reasonable time after finishing the task.
  • Only have access to the data and vaults that you are actively working on.
  • Ask to have access removed when you can enter data/vaults of projects you are not working on.

1Password structure:

Main rules:

  • Always generate codes via 1Password and use Two-Factor Authentication when possible.
  • Always save it in the right Vault.
  • Delete unused licenses or logins for services and update vault members.
  • On critical systems admins should have separate accounts for special use only. For daily usage, they will use their private accounts with the necessary permissions.

Vault organisation:

1. Each project has their own Vault

  • Only active teammembers have access to the Vault.
  • When a team member is switching to another project, they ask to have their access removed.
  • The project’s main developers (people with most knowledge) will keep access to the vault.

2. Each team/department has their own Vault

  • PM, Marketing, Design, C-level, Sales: Shared logins should be categorised by department. Personal logins should be saved in private.
  • Internal Infrastucture: Shared logins related to digital infrastucture that are not app specific. An item belongs to this vault if:
    • It offers functionality for development, it does not store client-sensitive data and is paid by Abtion. E.g. BrowserStack.
    • It contains information about several apps and is pending to be migrated into a client-specific plan. E.g. Rollbar.
  • Technical Red Tape: Tech-related logins that are highly sensitive. E.g. Admin login for Heroku.
  • Shared: Logins that are not sensitive and can be shared within the entire company. E.g. wifi code, educational logins, Kahoot.

You can request access to vaults through Slack in #access-and-permissions.

Google groups

  • A google group will be set up per client, e.g. [email protected].
  • The group will be used for creating client-specific accounts for services such as github, azure, etc.

Github

  • Access is controlled through teams. Abtioneers are part of teams. Teams have access to repos. E.g. Wordpress team will have access to several repos.
  • To give a better overview, members should not be granted direct access to any repo.
  • The Abtion team has read access to all repos. All Abtioneers are members of the Abtion team.
  • Every new client with a developer team will have their own Github team. E.g. danish-shipping.
  • Every client has a github account - using the team’s google group. This account is added as a member of the client team.
  • Several teams may have access to the same repos. E.g. The Digital Infrastructure team may have access to some clients’ repos while they are on maintenance.

You can request access to teams through Slack in #access-and-permissions.

Heroku

  • Access is controlled through heroku teams. Teams own project pipelines and apps. Abtioneers are members of teams
  • To give a better overview, members should not be granted direct access to any pipeline or app.
  • Every client has a heroku account - using the team’s google group. This account is added to the heroku team as “admin”
  • The client account is connected to the client specific github account and is used for connecting heroku pipelines and apps to github repositories.
  • Developers must have the “member” role in the team.
  • Abtion’s admin must have the “admin” role in the team.
  • Abtion’s admin will not be used for normal usage during development. The usage will be limited to admin-restricted action’s such as granting and removing permissions.

You can request access to teams through Slack in #access-and-permissions.

Managing accounts:

  • Keep the license overview up to date. This will help us track the activity on services and licenses as well as make it easier to downgrade/upgrade when needed.
  • We follow the basic structure of 1Password, creating a seperate ‘section’ for each project in Asana.