An audit identified PII being utilized in the development environment of a critical application. The Chief Privacy Officer (CPO) is adamant that this data must be removed; however, the developers are concerned that without real data they cannot perform functionality tests and search for specific data. Which of the following should a security professional implement to BEST satisfy both the CPO's and the development team's requirements?
Boogie_79
Highly Voted 1Â year, 8Â months agoTinyTrexArmz
1Â year, 3Â months agoThreeKings
1Â year agoProctored_Expert
Highly Voted 1Â year, 4Â months agoCS3000
8Â months, 1Â week agoBD69
1Â month agoscorpion_king149
8Â months, 1Â week agolockupmanjc
5Â months, 1Â week agoTheFivePips
6Â months agoLuchis_69
Most Recent 3Â days, 21Â hours agoGeronemo
6Â days, 9Â hours agoNemish71
1Â week agothea_smith
1Â week, 2Â days agoevilCorpBot7494
2Â weeks agorussian
2Â weeks, 3Â days ago_deleteme_
3Â weeks, 4Â days agoBD69
1Â month agoBD69
1Â month ago[Removed]
1Â month agoSeWiz
1Â month, 1Â week agotnar140
1Â month, 1Â week ago_deleteme_
1Â month, 4Â weeks agoSareena13
2Â months agoDrakeMallard
2Â months, 1Â week agoBD69
1Â month agoTM78
2Â months, 2Â weeks ago