I practiced a similar question, and I feel like downloading logs for all installed fingers could be an option, but I can't recall the exact terminology.
Hmm, this is a tricky one. I'd say the key is to really dig into the security and regulatory impacts on the business, and then use that to update the current security policy and define some clear architecture principles. That way we can make sure security is baked into the architecture planning from the start, with a dedicated security architect to oversee it.
Amos
4 months agoBettyann
4 months agoKara
4 months agoArlette
4 months agoSkye
5 months agoStephen
5 months agoDonette
5 months agoFausto
5 months agoAngelo
5 months agoBarrett
5 months agoJames
5 months agoArdella
5 months agoKatlyn
5 months ago