L5: Operations & Maintenance
Use Role-Based Access Control (RBAC): Set up RBAC to limit data access based on user roles and responsibilities.
Schedule regular penetration tests to identify and fix vulnerabilities in data storage and processing system.
References
World Bank (2021). Principles on Identification for Sustainable Development: Toward the Digital Age. Washington, D.C. https:// documents1.worldbank.org/curated/en/213581486378184357/pdf/ Principles-on-Identification-for-Sustainable-Development-Toward-the- Digital-Age.pdf