security_considerations
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security_considerations [2019/02/15 12:38] – lucy | security_considerations [2019/10/08 14:18] – lucy | ||
---|---|---|---|
Line 3: | Line 3: | ||
* **Restricted network based access to LUCY**: http:// | * **Restricted network based access to LUCY**: http:// | ||
* **Secure the user access**: http:// | * **Secure the user access**: http:// | ||
+ | *** 2FA Authentication**: | ||
+ | * **SSO**: https:// | ||
* **Restrict the user access**: http:// | * **Restrict the user access**: http:// | ||
- | * **Secure Setup of LUCY**: http:// | + | * **Secure Setup of LUCY in DMZ**: http:// |
* **Secure (and anonymous) storage of data**: http:// | * **Secure (and anonymous) storage of data**: http:// | ||
+ | * **Delete sensitive data:** https:// | ||
* **Secure communication channels**: http:// | * **Secure communication channels**: http:// | ||
* **Transparent network communication**: | * **Transparent network communication**: |
security_considerations.txt · Last modified: 2021/12/13 15:13 by lucysecurity