An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
Boogie_79
Highly Voted 9 months, 3 weeks agoTinyTrexArmz
2 years, 5 months agoAlcpt
10 months, 2 weeks agoThreeKings
2 years, 3 months agoProctored_Expert
Highly Voted 9 months, 3 weeks agoCS3000
1 year, 10 months agoBD69
1 year, 3 months agoscorpion_king149
1 year, 10 months agolockupmanjc
1 year, 7 months agoTheFivePips
1 year, 8 months agoasum
Most Recent 9 months, 3 weeks agoSandon
2 years, 5 months agoRichtx
9 months, 3 weeks agoSamo1
9 months, 3 weeks agoSamo1
9 months, 3 weeks agoYurrii
9 months, 3 weeks agoConfuzed
9 months, 3 weeks agofouserd
9 months, 3 weeks agoBevMe
9 months, 3 weeks agoBevMe
2 years, 2 months agostaoic
9 months, 3 weeks agomilktea810182
9 months, 3 weeks agoEssi
9 months, 3 weeks agoProtract8593
9 months, 3 weeks agoProtract8593
9 months, 3 weeks agoProtract8593
1 year, 11 months agoje123
9 months, 3 weeks agoCCNPsec
9 months, 3 weeks ago