Replies: 1 comment
-
Hello @pas-comme, There are several different options depending on which level the problem needs to be handled. For information systems you have at least the following options:
These are just some of the options on various levels, but it really depends on how far it is compromised. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Dear all,
I would like to use X-Road to exchange data between multiple information systems.
I have a question out of curiosity regarding security: if a malicious actor gains full control of an information system within the X-Road ecosystem, explain the principles of the ecosystem that prevent this from affecting other information systems.
Thank you to anyone who responds
Best regards,
Beta Was this translation helpful? Give feedback.
All reactions