HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.35 Obtaining information on security weaknesses of the system

S 2.35 Obtaining information on security weaknesses of the system

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: IT Security Management, Administrators

In case of security flaws that have become known or have been disclosed in publications, the required organisational and administrative measures must be taken or additional security hardware/software be employed.

Therefore, it is very important to obtain information on vulnerabilities which have recently become known. Sources:

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
July 1999
home