The software uses role-based access control (RBAC) for enterprise security policy management. A user can have multiple roles, and each role has several operation permissions and one data permission. The superposition of all role permissions is a user's permission set.
All operations of the system will automatically generate operation logs, which can be queried and used for auditing.
The user's abnormal operation will be recorded in the log for later viewing, and will prompt the user in time.
The software can customize the scope and frequency of data backup as required.