![]() Then, you forward the tested backup to the necessary environments to restore it and use it for development and testing. That stage must ensure that all data are impersonal, and the secret data are changed.Īfter that stage, you can return to step 5 again for the tested database in the protected non-production environment. For instance, step 6 requires a specific, protected environment for preliminary testing. However, the algorithm becomes more complicated after step 5.
0 Comments
Leave a Reply. |