Security
- Teaching Me: Please Teach Me About Handling Data Related to AI
- Does Teachme AI use data for model retraining?
- Preventing the Setting of Easily Predictable Passwords
- Is it possible to restrict the email content or file attachments in the email function?
- How is the responsibility boundary defined in the provision of cloud services when using AWS?
- Are you managing work request records and verifying work performance logs when operating in the production environment?
- Can the service configuration diagram be disclosed?
- Are you using a server certificate?
- Is there a possibility that data will be reused without the owner's permission?
- Implementing measures to defend against spam emails, etc. (introduction of dedicated tools, coordination with antivirus measures)
- Are You Taking Appropriate Measures Against Internal Fraud?
- Countermeasures to Prevent the Leakage of Encryption Keys Used Internally in Services
- System Configuration and Setting Information Management: What Approaches Are You Taking?
- What measures are you taking to detect abnormal states of the system at an early stage?
- User Security in Account Management
- How is safety ensured when implementing changes to production systems?
- Are you using services like NTP for log time synchronization?
- Is data input and output to the system properly validated and sanitized?
- Will user-created data be deleted after service cancellation?
- Are login passwords stored in an encrypted state within the system?
- How is the security of networks and accounts used for maintenance ensured as a service provider?
- Are you operating test and development environments separately from the production environment?
- Are important information handled within the service stored in a private network area that cannot be directly connected to the Internet?
- Are you clearly separating dedicated areas and common areas for each company?
- Can I as a service user verify various access logs and operation logs for the service?
- Do You Have Antivirus Software Installed on Your Server?
- User Security Options for Account Login
- Is there an established procedure for service recovery in case of trouble?
- Is the data being stored encrypted?
- As a service user, what kind of security can be applied to access the entire service?