User Tools

Site Tools


security_considerations

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revisionBoth sides next revision
security_considerations [2019/10/08 14:18] lucysecurity_considerations [2019/10/08 14:19] lucy
Line 17: Line 17:
   * **Ability to monitor the system in real time**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=system_performance_monitoring   * **Ability to monitor the system in real time**: http://phishing-server.com/PS/doc/dokuwiki/doku.php?id=system_performance_monitoring
   * **Data Security, Processes Privacy (GDPR)**: https://wiki.lucysecurity.com/doku.php?id=company_application_and_data_security   * **Data Security, Processes Privacy (GDPR)**: https://wiki.lucysecurity.com/doku.php?id=company_application_and_data_security
 +  * **Ability to store key on HSM:** https://wiki.lucysecurity.com/doku.php?id=technical_information&s[]=hsm
  
  
 Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://www.owasp.org/). If you still should experience a security issue, please contact us under support@lucysecurity.com. Additionally we perform regular external (anonymous) penetration tests according to the OWASP testing categories (https://www.owasp.org/). If you still should experience a security issue, please contact us under support@lucysecurity.com.
  
security_considerations.txt · Last modified: 2021/12/13 15:13 by lucysecurity