...
In the following sections we describe the different agents and profiles that are typically used for storing data and the interactions that can be used in a DPP context.
Archiving Agent
Expand | ||
---|---|---|
| ||
Archiving Agent provides comprehensive data management capabilities. These agents support both archival and retrieval processes.
Access more information by visiting Archiving section in the InfoZone documentation. |
Archiving Agent provides comprehensive data management capabilities. These agents support both archival and retrieval processes.
...
4. Auditing and Compliance:
Audit Trails: Keep track of who accessed and modified the Data Veracity records. Ensure all actions on sensitive data are logged to support compliance audits and internal controls.
5. External Databases:
Refer to the specific documentation provided by each database platform. Implement encryption and secure data handling practices as recommended:
PostgreSQL: PostgreSQL Documentation
Oracle Database: Oracle Security Guides
SAP HANA: Refer to SAP Help portal for SAP HANA documentation
Access more information by visiting Data Veracity section in the InfoZone documentation.
...
Restrict Field Edits: To prevent unauthorized modifications, configure restricted fields to protect sensitive data within UDRs from being edited.
Monitor and Audit: Regularly review the ECS Maintenance logs and use the statistics reports to ensure that deletions and data management practices comply with organizational organisational security policies.
Access more information by visiting Error Correction System section in the InfoZone documentation.
...
2. File Handling Procedures:
File Creation and Management: When the Disk Forwarding Agent receives a 'Begin Batch' message, it should create files in a designated temporary directory, moving them to a permanent location only once fully processed.
3. Data Minimization and Retention:
...
4. Command Execution Security:
Command Configuration: If commands are configured to run after file closure, ensure these commands do not expose sensitive data or interact with unsecured external systems. Validate and sanitize all command inputs to prevent execution vulnerabilities.
5. Error Handling and Incident Response:
...