...
Date | Target Environment | (PRD) Source backup date | Requestor | Reason | Form |
---|---|---|---|---|---|
05 Jan | TRN | 05 Jan | Pam K | Post month end refresh | Jan 5 Feb 3 2015 Refresh KFS Environments Request - part 1.docx |
05 Jan | SUP | 05 Jan | Pam K | Post month end refresh | Jan 5 Feb 3 2015 Refresh KFS Environments Request - part 1.docx07 Jan |
YE | 07 Jan | Pam K | Post month end refresh | Jan 5 Feb 4 2015 Refresh KFS Environments Request - part 3Repeat failed Refresh YEN Environment.docx06 Jan | |
UAT | 06 Jan | Pam K | Post month end refresh | Jan 5 Feb 3 2015 Refresh KFS Environments Request - part 2.docx06 Jan | |
DEV | 06 Jan | Pam K | Post month end refresh | Jan 5 Feb 3 2015 Refresh KFS Environments Request - part 2.docx07 Jan | |
DR | 07 Jan | Pam K | Post month end refresh | Jan 5 Feb 3 2015 Refresh KFS Environments Request - part 3.docx |
Requirements
Environment | PII Script Execution | Encryption following PII scripts |
---|---|---|
DEV | Yes | Yes |
TSTYE | Yes | Yes |
UAT | Yes | Yes |
SUP | No* | No (data already encrypted from import) |
TRN | Yes | Yes |
DR (not for DR) | Yes | Yes |
*Backdoor access in all environments is now controlled by permissions in KFS. Only those granted this permission via management authorization have the ability to utilize backdoor access. All sensitive data is encrypted in all instances so only those with the proper credemtials credentials or permission for backdoor access will have visibility to encrypted data.
...