📄️ How do I start implementing restrictive actions in a sensitive project?
Start with using the closest convenient settings such as view and download restrictions.
📄️ How to handle hierarchical scope data with simultaneous source usage restrictions?
Use projects and subprojects to differentiate levels of access to resources.
📄️ How do I set up enforced compliance goals for my projects?
Use the security requirements to enforce compliance for your project.
📄️ How do I customarily promote users who achieve specific project compliance goals?
You use a combination of user-profiles and security requirements.
📄️ What is the relationship between VM user profiles and projects?
User profiles allow you to avoid manual work for users' permissions when they reach a security level.
📄️ How can I audit a classified project?
This task belongs to the tiAudit team.
📄️ What is the relationship between project memberships and user certifications?
Project memberships are project-based only, user certifications work with security requirements together.
📄️ What is the relationship between user certifications and security requirements?
They are a user authorization tool for projects.
📄️ How do I enforce compliance for an export-controlled (ITAR) research project?
Use the User certifications and tag the reosources with the appropriate project.
📄️ How do I onboard users in projects?
Add users to the project and optionally assign the project to a sub-admin.
📄️ How to conduct research project management in tiCrypt?
tiCrypt project management workflows.