Key Criteria |
Ranking |
Yes |
No |
Rank |
No. (%) |
No. (%) |
No. (%) |
Appropriate authentication and authorization methods |
1 |
28 (66.7%) |
39 (92.9%) |
3 (7.1%) |
Backup and restore procedures |
1 |
15 (35.7%) |
42 (100%) |
0 |
version control dashboards |
5 |
10 (23.8%) |
39 (92.9%) |
3 (7.1%) |
Audit trails |
1 |
16 (38.1%) |
41 (97.6%) |
1 (2.4%) |
Protecting data from change |
1 |
16 (38.1%) |
42 (100%) |
0 |
Defining role-based security |
1 |
17 (40.5%) |
41 (97.6%) |
1 (2.4%) |
Automatic accessibility change by change in user roles or groups |
1 |
20 (47.6%) |
36 (85.7%) |
4 (14.3%) |