Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In the following sections we describe the different agents and profiles that are typically used for storing data and the interactions that can be used in a DPP context.

Archiving Agent

Expand
titleArchiving Agent

Archiving Agent provides comprehensive data management capabilities. These agents support both archival and retrieval processes.

  • Looking up Archived Data: Customers can use the Archive Inspector tool to look up Archived files. This tool is accessible through the Execution Manager and provides advanced search functionality that allows users to search for files within specified periods.

  • Deleting Archived Data: The Archive Cleaner task is responsible for the automated deletion of outdated archives based on the purge criteria set within the Archive profile. Customers can manually trigger cleanup processes to ensure that data does not exceed its intended retention period.

Access more information by visiting Archiving section in the InfoZone documentation.

Archiving Agent provides comprehensive data management capabilities. These agents support both archival and retrieval processes.

...

4. Auditing and Compliance:

  • Audit Trails: Keep track of who accessed and modified the Data Veracity records. Ensure all actions on sensitive data are logged to support compliance audits and internal controls.

5. External Databases:

Refer to the specific documentation provided by each database platform. Implement encryption and secure data handling practices as recommended:

Access more information by visiting Data Veracity section in the InfoZone documentation.

...

  • Restrict Field Edits: To prevent unauthorized modifications, configure restricted fields to protect sensitive data within UDRs from being edited.

  • Monitor and Audit: Regularly review the ECS Maintenance logs and use the statistics reports to ensure that deletions and data management practices comply with organizational organisational security policies.

Access more information by visiting Error Correction System section in the InfoZone documentation.

...

2. File Handling Procedures:

  • File Creation and Management: When the Disk Forwarding Agent receives a 'Begin Batch' message, it should create files in a designated temporary directory, moving them to a permanent location only once fully processed.

3. Data Minimization and Retention:

...

4. Command Execution Security:

  • Command Configuration: If commands are configured to run after file closure, ensure these commands do not expose sensitive data or interact with unsecured external systems. Validate and sanitize all command inputs to prevent execution vulnerabilities.

5. Error Handling and Incident Response:

...