Question
Ford
US
Last activity: 11 Jun 2024 10:19 EDT
Any Pega documentation on how the clipboard data is isolated and protected?
Our Cyber Security team is asking questions about the clipboard in Pega. How it is used as temporary storage, what potentially has access to it. and if for some reason there was malicious codes what protections are in place to isolate that and prevent it from doing anything harmful to the system. I think they are looking for assurances that won't be an attack vector that can be used to compromise the system. Are there any docs that I can use to put their mind at ease? Any links on the Pega site that go into detail on security that I can reference?
Thank You.