CyberSecurity

luciano_102's picture
luciano_102
Category: 

This project aims to develop connectors that meet the requirements of information security, such as: integrity, confidentiality , non-repudiation and authenticity.

The repository already contains developed connectors for integrity, encryption, decryption , digital printing and digital signature with digital certificates PKCS#12.

The development of connectors that meet other Information Security Requirements are welcome.

Releases for Information Security

Total downloads: 2 711
Version BonitaBPM Version Post date Download Link to content
PF2 7.x, 6.5.x, 6.4.x 2015-Jun-15 Download
2711 downloads
Release note

Does bonita have out of the box features for data confidentiality processes

I need to handle data that is restricted according to different actors.

Can I define in someway that data so it is handled differently whether is one actor or another.

And also how is data secured in terms of attackers trying to steal data with attacks like men in the middle or any other types of attacks.

Can data be encrypted in the database used by Bonita or when transmitted to an external database?

Thanks.

hadi.elkhoury's picture
hadi.elkhoury
Category: 

How do we forecast relationships between BPM (Business Process Modeling) and Information Security visual thinking at Sekimia?

The MindsetPimp proof of concept code was designed for the Pimp my Bonita Open Source BPM Community Contest :

Notifications