An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to best satisfy both the CPO's and the development team's requirements?
je123
Highly Voted 1 year, 10 months agoTreeeSon
Highly Voted 1 year, 9 months agojohnabayot
1 year, 5 months agoPaula77
Most Recent 1 year, 3 months agomaggie22
1 year, 5 months agoEMP00000000
1 year, 7 months agoYomzie
1 year, 5 months agofryderyk
1 year, 8 months ago[Removed]
1 year, 8 months agoJT4
1 year, 9 months agoja1092m
1 year, 10 months agoja1092m
1 year, 10 months agoApplebeesWaiter1122
1 year, 11 months agoGamsje
1 year, 11 months agomtnews
1 year, 11 months ago