System Security¶
System security addresses
- Confidentiality: The system's data is accessible to authorised users only.
- Integrity: The system prevents unauthorised access or modification of the model and/or the entire system; by (a) adhering to best security practices1, 2, (b) keeping abreast of vulnerabilities, (c) being non-repudiation proof.
- Accountability: All system actions are tracked and stored, hence breaches can be systematically investigated.
Therefore, the detail the prospective system's:
- Activity Tracking System: For auditability requirements, etc.
- System Protection & Privacy Layer: Ensuring adherence to laws and regulations, e.g., GDPR, HIPAA, etc.
- Legal Compliance: "… adherence to laws and regulations that are enforced by the government".
- Regulatory Compliance: "… adherence to rules and regulations set forth by regulatory bodies that oversee specific industries".
- Privacy: Encryption
- Authentication System: That ascertains a user's authenticity.
- Authorisation System: That ascertains, per user, access to authorised areas only.