6. EPMO Open Source Coordination Office Redaction File Detail Report

Produced by Araxis Merge on 11/9/2017 10:44:34 AM Eastern Standard Time. See www.araxis.com for information about Merge. This report uses XHTML and CSS2, and is best viewed with a modern standards-compliant browser. For optimum results when printing this report, use landscape orientation and enable printing of background images and colours in your browser.

6.1 Files compared

# Location File Last Modified
1 REFDOC-v2.1.0.zip\NVCC\Documentation DatabaseJustification.html Thu Oct 19 17:36:40 2017 UTC
2 REFDOC-v2.1.0.zip\NVCC\Documentation DatabaseJustification.html Wed Nov 8 15:30:00 2017 UTC

6.2 Comparison summary

Description Between
Files 1 and 2
Text Blocks Lines
Unchanged 2 32
Changed 1 2
Inserted 0 0
Removed 0 0

6.3 Comparison options

Whitespace
Character case Differences in character case are significant
Line endings Differences in line endings (CR and LF characters) are ignored
CR/LF characters Not shown in the comparison detail

6.4 Active regular expressions

No regular expressions were active.

6.5 Comparison detail

  1   <!DOCTYPE  html>
  2   <html>
  3   <head>
  4       <title >Justifica tion for t rusting da tabase</ti tle>
  5   </head>
  6   <body>
  7  
  8       <h1 id ="justific ation-for- trusting-d atabase">J ustificati on for tru sting data base</h1>
  9   <p>The REF DOC applic ation stor es and ret rieves dat a from the  <code>CC_ REFDOC</co de> databa se hosted  at <code>
D N S      D NS . URL          </code>, t he Field R eporting E nclave of  the Corpor ate Data W arehouse r un by the  Business I ntelligenc e Service  Line and h osted by E nterprise  Operations . These en tities are  all withi n the VA a nd are pro viding dat a and serv ices on be half of th e VA in ac cordance w ith the re quirements  of the VA .</p>
  10   <p>There a re no SQL  Injection  vulnerabil ities iden tified by  Fortify at  any sever ity level. </p>
  11   <p>There a re two dif ferent ori gins of th e informat ion that c an be retr ieved from  this data base. The  first is t he sibling  datbase < code>CDWWo rk</code>  which is a  relationa l data war ehouse cop y of the d ata that i s in the e lectronic  medical re cord. Anyt hing from  <code>CDWW ork</code>  is treate d as trust worthy and  correct.< /p>
  12   <p>The sec ond source  is data t hat was pr eviously e ntered by  the applic ation, or  was set up  as part o f applicat ion config uration. D ata that i s entered  in these l ocal table s is deriv ed from da ta from <c ode>CDWWor k</code> ( and thus t rusted), i s timestam ps generat ed by the  applicatio n or datab ase for lo gging purp oses, or i s validate d against  data from  <code>CDWW ork</code>  before it  is entere d.</p>
  13   <p>No othe r applicat ions have  access to  this datab ase and co nnection s trings are  encrypted  per EWIS  hosting po licy.</p>
  14  
  15  
  16   </body>
  17   </html>