>
>
Data Storage and Retention

Floral Clinic Physiotherapy Service- use secure data storage applies to data at rest stored in the server, external hard drives, and network-based storage area network (SAN).

Floral Clinic Physiotherapy Service seeks to ensure “CIA” as below contents to avoid the vulnerabilities inherent in storage systems such as Lack of encryption, Complexity of Cloud storage, Incomplete data destruction, and Lack of physical security.

Floral Clinic Physiotherapy Service has implemented the following data security best practices:

Retention security log

Maintaining cybersecurity needs and meeting Floral Clinic Physiotherapy Service’s data compliance regulations. Maintaining a reliable security log is not only a good security posture but brings our service’s mind. Besides, keeping logs is important to keep our service safe and within compliance.

User IDs and credentials, terminal identities, system configuration changes, date and timestamp information for access to key assets, successful and failed login attempts, and activity logs of unauthorized access attempts are the important Log types of Floral Clinic Physiotherapy Service. Our service keeps audit logs, IDS (Intrusion Detection System) logs, firewall logs for a minimum of two months, and audit logs for three years.

Floral Clinic Physiotherapy Service implements Security log retention as follows:

  1. Define the worth audit categories.
  2. Use security monitoring software that is available for this and keeps tabs on security logs to make sure there are no cybersecurity breaches
  3. Automating logs to make sure the right data is collected, and the security logs are reliable.
  4. Storing redundant log data in database records and as compressed flat files.
  5. Floral Clinic Physiotherapy Service uses a strong tool that responds to threats with early action, including sending alerts, logging off users, or even shutting down and restarting systems.
  6. Focusing on user activity can run reports based on user activity logs, and pay special attention to accounts with privileged access while keeping watch for abnormal usage.
  7. Evolve event logging monitoring.
  8. Update and give a reliable report to meet the needs of related parties and provide the evidence required to show our service meets compliance.