Table 3: Feature of security and related criteria.

Key Criteria Ranking Yes No
Rank No. (%) No. (%) No. (%)
Appropriate authentication and authorization methods 1 28 (66.7%) 39 (92.9%) 3 (7.1%)
Backup and restore procedures 1 15 (35.7%) 42 (100%) 0
version control dashboards 5 10 (23.8%) 39 (92.9%) 3 (7.1%)
Audit trails 1 16 (38.1%) 41 (97.6%) 1 (2.4%)
Protecting data from change 1 16 (38.1%) 42 (100%) 0
Defining role-based security 1 17 (40.5%) 41 (97.6%) 1 (2.4%)
Automatic accessibility change by change in user roles or groups 1 20 (47.6%) 36 (85.7%) 4 (14.3%)