Securing AR system
The process of securing the Remedy system includes many different processes, technologies, and methods. Refer to the following topics as you work to provide a secure Remedy system:
Task | Action | Reference |
---|---|---|
1 | Configure ports and firewalls. | |
2 | Encrypt the Remedy system. |
See also ENCRYPT in Functions and Encrypt Data at Rest in Field-Properties. |
3 | Set up authentication and passwords. | |
4 | Set permissions. | |
5 | Ensure data privacy and address data privacy requests associated with the General Data Protection Regulation (GDPR). |