HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 2.66 Lack of or Inadequate IT Security Management

T 2.66 Lack of or Inadequate IT Security Management

The complexity of the IT systems used in many enterprises today and the trend towards networking these systems makes it imperative to proceed in an organised fashion with regard to planning, implementation and monitoring of the IT security process. Experience shows that it is not sufficient simply to arrange for safeguards to be implemented, as often the individuals concerned, especially the IT users, do not have the technical expertise and/or time that are needed to implement them properly. As a result, security measures frequently fail to be implemented at all so that it is impossible to attain a satisfactory level of security. Even if a satisfactory level of security is achieved, it must be continuously nurtured if it is to remain current.

Inadequate IT security management is often a symptom of a poor overall organisation of the IT security process and hence of IT operations as a whole. Examples of specific threats which result from inadequate IT security management include the following:

Verantwortlich für Initiierung:

Verantwortlich für Umsetzung:

Sobald der Maßnahmen- / Gefährdungstitel eingetragen wurde, ist in der Symbolleiste der Buchstabe D anzuklicken, damit die Kopfzeile gefüllt wird.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home