{"id":516,"title":"What documented capabilities does your resource meet for data security?","url":"","description":"Continuous monitoring requirements for sensitive data  (1) \r\nRequirements for hosting Tribal data  (2) \r\nRequirements for national sovereignty (e.g., GDPR)  (3) \r\nCFR part 11 requirements  (4) \r\nOther  (5)","image":"","tags":"","type":"text","license":"","rationale":"","principle":"A","fairmetrics":"","authors":[1410]}