Question: An audit Identified Pll being utilized In the development environment of a critical application. The Chief Privacy Officer (CPO) Is adamant that this data must
An audit Identified Pll being utilized In the development environment of a critical application. The Chief Privacy Officer (CPO) Is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data.
Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
A. Data anonymlzallon
B. Data encryption
C. Data masking
D. Data tokenization
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
