HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 2.64 Lack of or defective rules for the RAS system

T 2.64 Lack of or defective rules for the RAS system

If no rules or only inadequate ones have been set for the RAS system, this constitutes a considerable threat to the system as a whole. As a RAS system is composed of a number of components, the first set of threats comes from the "Organisational shortcomings" area of the various individual components, as set forth in the relevant module descriptions.

In the RAS environment, the threats outlined below deserve special mention.

Examples


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home