Confidential and protected access and usage
With access management controls, the ‘need to know’ can be established, mitigating risks of unauthorised viewing and sharing of sensitive information.
• Establish authorisation, access and usage controls to the attribute layer.
• Encrypt information and employ intelligent redaction at any stage.