To ensure data security only James and Drew should have root access to the Cemaritan production db. Volunteers should have access to a dev instance of the database that contains fake data.
Eventually, we'll want a staging instance of the database that contains a copy of the real production database. So James and Drew can test new releases with the real database before they get released to production. So long term we'll have
Dev --> Staging --> Prod
And volunteers will only have access to Dev (which will contain fake data).
To ensure data security only James and Drew should have root access to the Cemaritan production db. Volunteers should have access to a dev instance of the database that contains fake data.
Eventually, we'll want a staging instance of the database that contains a copy of the real production database. So James and Drew can test new releases with the real database before they get released to production. So long term we'll have
Dev --> Staging --> Prod
And volunteers will only have access to Dev (which will contain fake data).