HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 2.8 Uncontrolled use of resources

T 2.8 Uncontrolled use of resources

Resources - of any type - may only be used for their designated purpose. The persons responsible for the procurement and use of resources must both prevent their uncontrolled use and monitor their correct use. Inadequate control of the use of resources can entail multifarious risks.

Examples:

.
© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home