arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

O4.7 Implement a framework for safe data storage and processing

O4: Assure data security by design

RS2 Digital insecurity, RS1 Privacy Vulnerability, SV4 Technical shortcomings

L5: Operations & Maintenance

hashtag
Practices

Use Role-Based Access Control (RBAC): Set up RBAC to limit data access based on user roles and responsibilities.

Schedule regular penetration tests to identify and fix vulnerabilities in data storage and processing system.

hashtag
Resources

References

World Bank (2021). Principles on Identification for Sustainable Development: Toward the Digital Age. Washington, D.C. https:// documents1.worldbank.org/curated/en/213581486378184357/pdf/ Principles-on-Identification-for-Sustainable-Development-Toward-the- Digital-Age.pdf