An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
Boogie_79
Highly Voted 8 months, 1 week agoTinyTrexArmz
2 years, 4 months agoAlcpt
9 months agoThreeKings
2 years, 1 month agoProctored_Expert
Highly Voted 8 months, 1 week agoCS3000
1 year, 9 months agoBD69
1 year, 1 month agoscorpion_king149
1 year, 9 months agolockupmanjc
1 year, 6 months agoTheFivePips
1 year, 6 months agoasum
Most Recent 8 months, 1 week agoSandon
2 years, 4 months agoRichtx
8 months, 1 week agoSamo1
8 months, 1 week agoSamo1
8 months, 1 week agoYurrii
8 months, 1 week agoConfuzed
8 months, 1 week agofouserd
8 months, 1 week agoBevMe
8 months, 1 week agoBevMe
2 years, 1 month agostaoic
8 months, 1 week agomilktea810182
8 months, 1 week agoEssi
8 months, 1 week agoProtract8593
8 months, 1 week agoProtract8593
8 months, 1 week agoProtract8593
1 year, 10 months agoje123
8 months, 1 week agoCCNPsec
8 months, 1 week ago