Last Updated on December 21, 2021 by Admin
Application data integrity risk would be MOST directly addressed by a design that includes:
- access control technologies such as role-based entitlements.
- strict application of an authorized data dictionary.
- application log requirements such as field-level audit trails and user activity logs.
- reconciliation routines such as checksums, hash totals, and record counts.