23.02.2015 Views

Best Practices Domino Security - Nash!

Best Practices Domino Security - Nash!

Best Practices Domino Security - Nash!

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How to protect real sensitive data?<br />

Use named encryption keys shared between all users<br />

who should be able to access this information<br />

Even administrators cannot read this information<br />

but could see the encrypted items - and still support users in<br />

case of problems<br />

This has to be enabled on application level<br />

Developers & Administrators need to work together to get this<br />

implemented properly<br />

Organizational Policies needed for generating and<br />

distributing keys

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!