Access & Role Model

  • Roles and permissions.
  • Segregation of duties.
  • Admin vs user access.

Data Protection

  • Handling of PII and sensitive data.
  • Encryption standards.
  • Retention and deletion policies.

Audit & Logging

  • Data change logging.
  • Load audit trails.
  • Manual intervention tracking.