Compliance reporting, chain of custody, password vaults
Compliance reporting The storage of sensitive information such as customer details and payment information may require additional reporting to ensure compliance with the proper security controls.
Chain of custody describes the control and integrity of collected evidence. Chain of custody would not involve the implementation of encryption and authentication factors in this example.
Password vaults are used as secure storage and retrieval of authentication credentials. The protection of user data is not associated with password vaulting.
Last updated