HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 3.34 Unsuitable configuration of the management system

T 3.34 Unsuitable configuration of the management system

In order for a network management system and/or a system management system to be used securely, all components involved must be configured consistently. Although the individual components are usually managed from a central entity (management console), the management system is made up of a number of individual components which are distributed among the network components to be managed. A consistent configuration of such a system can be subdivided into two areas:

If the consistency of the configuration is damaged, either intentionally or unintentionally, then the components cease to work together smoothly, which can cause security problems. For example, a server may become inaccessible or access rights may become too relaxed.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
 
home