security_considerations
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
security_considerations [2019/10/08 14:15] – lucy | security_considerations [2019/10/08 14:19] – lucy | ||
---|---|---|---|
Line 8: | Line 8: | ||
* **Secure Setup of LUCY in DMZ**: http:// | * **Secure Setup of LUCY in DMZ**: http:// | ||
* **Secure (and anonymous) storage of data**: http:// | * **Secure (and anonymous) storage of data**: http:// | ||
+ | * **Delete sensitive data:** https:// | ||
* **Secure communication channels**: http:// | * **Secure communication channels**: http:// | ||
* **Transparent network communication**: | * **Transparent network communication**: | ||
Line 16: | Line 17: | ||
* **Ability to monitor the system in real time**: http:// | * **Ability to monitor the system in real time**: http:// | ||
* **Data Security, Processes Privacy (GDPR)**: https:// | * **Data Security, Processes Privacy (GDPR)**: https:// | ||
+ | * **Ability to store key on HSM:** https:// | ||
Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https:// | Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https:// | ||
security_considerations.txt · Last modified: 2021/12/13 15:13 by lucysecurity