![](https://pdfstore-manualsonline.prod.a.ki/pdfasset/0/2e/02e34f33-1e51-448e-b0aa-b6c2d688623b/02e34f33-1e51-448e-b0aa-b6c2d688623b-bg22c.png)
Security: Secure Sensitive Data Management
Configuring SSD
Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 455
21
• Read Permission—The read permissions associated with the rule. These
can be the following:
- Exclude—Lowest read permission. Users are not permitted to get
sensitive data in any form.
- Plaintext Only—Higher read permission than above ones. Users are
permitted to get sensitive data in plaintext only.
- Encrypted Only—Middle read permission. Users are permitted to get
sensitive data as encrypted only.
- Both (Plaintext and Encrypted)—Highest read permission. Users have
both encrypted and plaintext permissions and are permitted to get
sensitive data as encrypted and in plaintext
• Default Read Mode—All default read modes are subjected to the read
permission of the rule. The following options exist, but some might be
rejected, depending on the rule’s read permission.
- Exclude—Do not allow reading the sensitive data.
- Encrypted—Sensitive data is presented encrypted.
- Plaintext—Sensitive data is presented as plaintext.
STEP 3 The following actions can be performed:
• Restore to Default—Restore a user-modified default rule to the default rule.
• Restore All Rules to Default—Restore all user-modified default rules to the
default rule and remove all user-defined rules.