logo

Database

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Requirements
  5. /

  6. Data

Data

176. Restrict system objects300. Mask sensitive data177. Avoid caching and temporary files301. Notify configuration changes178. Use digital signatures305. Prioritize token usage180. Use mock data321. Avoid deserializing untrusted data181. Transmit data using secure protocols329. Keep client-side storage without sensitive data183. Delete sensitive data securely365. Avoid exposing technical information184. Obfuscate application data375. Remove sensitive data from client-side applications185. Encrypt sensitive information383. Sandboxing to limit model exposure to unverified data sources