Search
Securing and auditing data
-
Module
Securing and auditing data
2 Topics
30 mins
-
Pega Platform™ provides multiple ways to ensure the integrity of and ability to audit application data. Applications automatically track Actions...
Reviewing log files
-
Module
Reviewing log files
3 Topics
30 mins
-
Pega Platform™ provides logs that record system events such as application errors and performance and security issues. Use log files to identify and...
Security Checklist awareness
-
Module
Security Checklist awareness
1 Topic
20 mins
Platform -
- What is the Security Checklist?
- How do I access the Security Checklist?
- How to use the Security Checklist?/What is the purpose?
- What happens if I...
Managing application access
-
Challenge
Managing application access
1 Task
5 mins
-
GoGoRoad product managers want to restrict access to development on the New Vendor Case Type so that only approved roles perform updates. Configure...
Assessing application performance
-
Challenge
Assessing application performance
2 Tasks
10 mins
-
The Human Resources (HR) department has noticed that the open positions screen of the candidate case type has been loading the list of positions...
Auditing changes to the value of fields
-
Challenge
Auditing changes to the value of fields
1 Task
5 mins
-
HRApps provides payroll setup for employees. For the Payroll Setup Case Type, an employee provides their bank information for direct deposit. When the...
Creating users and roles
-
Challenge
Creating users and roles
4 Tasks
10 mins
-
GoGoRoad provides roadside assistance services through contracted vendors. To ensure customer satisfaction and service consistency across vendors...
Configuring security policies
-
Challenge
Configuring security policies
2 Tasks
5 mins
-
GogoRoad is experiencing a large number of failed login attempts. Management suspects that the attempts are malicious attacks by an internet bot...
Monitoring the guardrail compliance score
-
Challenge
Monitoring the guardrail compliance score
2 Tasks
10 mins
-
The GoGoRoad application development team has completed and checked in their work for the day. You evaluate the quality of their work by viewing the...
Securing an application using attribute-based access control
-
Challenge
Securing an application using attribute-based access control
4 Tasks
30 mins
-
Each candidate Case includes a Taxpayer Identification Number (TIN) to identify the candidate. This information is considered sensitive personal...