Security considerations for enabling new features

  • Updated

RecordPoint regularly deploys new functionality to the platform. As a powerful data management tool, we recommend regularly reviewing access and permissions to ensure that security configuration aligns with your organizational risk appetite. The following questions are designed to prompt you to consider how best to securely enable new features and use them within your organization.

 

RecordPoint recommends consideration of the following questions prior to enabling a new feature:

  1. If the feature allows a user to access of search for sensitive data, does the new feature expand/augment this access?
  2. Does the new feature allow the export, alteration or removal (including disposal) of data from the system?

If the answer is ‘Yes’ to either of the above questions, carefully consider:

  1. Limiting access to only users who need the function to undertake their role. See our help page on Security Profiles for guidance on how to configure security roles to limit access to a feature.
  2. Ensuring users with access that they understand their obligations around personal and confidential information under your policies and regulations.

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request