Securing AR system
The process of securing the Remedy system includes many different processes, technologies, and methods. Refer to the following topics as you work to provide a secure Remedy system:
Task | Action | Reference |
---|---|---|
1 | Configure ports and firewalls. | |
2 | Encrypt the Remedy system. |
See also ENCRYPT in Functions and Encrypt Data at Rest in Field Properties. |
3 | Set up authentication and passwords. | |
4 | Set permissions. | Setting up users, access, and preferences |
5 | Ensure data privacy and address data privacy requests associated with the General Data Protection Regulation (GDPR). |
Was this page helpful? Yes No
Submitting...
Thank you
Comments
Log in or register to comment.