Risk assessments & threat model
- 4 & 6 eye principles that inherit organization's ICT policies.
- Audit Log that monitors data for potential security breaches
- User restriction and prohibition module
Security framework is implemented for maintaining ground rules of security and business policies; keeping track of data modifications, files edits, prints, deletes, or views of documents and files.