An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to best satisfy both the CPO's and the development team's requirements?
je123
Highly Voted 1 year, 8 months agoTreeeSon
Highly Voted 1 year, 7 months agojohnabayot
1 year, 3 months agoPaula77
Most Recent 1 year, 1 month agomaggie22
1 year, 3 months agoEMP00000000
1 year, 5 months agoYomzie
1 year, 3 months agofryderyk
1 year, 6 months ago[Removed]
1 year, 6 months agoJT4
1 year, 7 months agoja1092m
1 year, 8 months agoja1092m
1 year, 8 months agoApplebeesWaiter1122
1 year, 9 months agoGamsje
1 year, 9 months agomtnews
1 year, 10 months ago