HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 2.4 Insufficient monitoring of IT security measures

T 2.4 Insufficient monitoring of IT security measures

Following the introduction of measures which are aimed at achieving IT security (e.g. data backups, access control, rules regarding conduct during emergencies), these must also be consistently implemented. If monitoring of IT security measures is absent or only inadequate, it is not possible to establish either abuse or effectiveness. This makes it impossible to respond promptly and in a manner appropriate to the situation.

In addition, there are security measures which are only effective when appropriate controls are implemented. These include, for example, logging functions whose security characteristics only become apparent when the logged data is analysed.

Examples


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home