-
-
-
- Introduction to security
- Secure development
- Security certification
- Field properties concerning security
- Developing user groups securely
- Security considerations for user interface
- Secure file organization
- Securely using the request
- Cross Site Scripting (XSS)
- Other options concerning secure development
- Security analysis
- Secure deployment
- Secure application management
- Scrambling of testdata
- Anonymization of personal data
- Using robots.txt
- Permission settings
- Security measures
- Data encryption
Secure deployment
This page describes secure deployment:
- Anonimiseren
It is possible to synchronize production data to a test or develop environment. When this is done, personal data should be anonymized. This can be done for entire tables, or on subset by using the Anonymization action. Anonymization has the advantage that transactional data can still be retained, for example for data analysis, without saving personal data.