Security, Controls & Compliance
Access & Role Model
- Roles and permissions.
- Segregation of duties.
- Admin vs user access.
Data Protection
- Handling of PII and sensitive data.
- Encryption standards.
- Retention and deletion policies.
Audit & Logging
- Data change logging.
- Load audit trails.
- Manual intervention tracking.