O4: Assure data security by design
RS2 Digital insecurity
L3: Development, L5: Operations & Maintenance
Implement robust data validation and backup by ensuring data integrity and authenticity through advanced methods. This can be done via:Regular data backupsAdvanced validation methodsCompleteness and consistency checkingUse of cryptographic signatures for data authenticity
Implement robust data validation and backup by ensuring data integrity and authenticity through advanced methods. This can be done via:
Regular data backups
Advanced validation methods
Completeness and consistency checking
Use of cryptographic signatures for data authenticity
References
Last updated 1 year ago
Was this helpful?