User guide

Chapter 1: Security Risks
1-42
Resources to be Protected
The following resources are used in the Interstage Management Console. If advanced security
measures are requested, it is advisable to protect these resources as part of that security.
Table 1-15 Resources to be Protected
Function Resources that should be protected
Various operations using the Interstage
Management Console
- Information stored in the repository
Possible Security Risks to Resources
Additional possible security threats to resources that should be protected against using the
Configuration Management function are shown below.
Table 1-16 Possible Threats to Resources
Resources that should be protected Additional possible threats
Information stored in the repository
- Overwriting the information that is recorded in files
- Exploiting the information that is recorded in files
- File corruption
Threat Prevention
The following table lists countermeasures that can be taken to prevent against security breaches using
the Configuration Management function.
Table 1-17 Threat Countermeasures
Possible threat Countermeasures
Overwriting the information that is recorded
in files
- Implement access authority settings for the files in
which information is saved
- Perform regular data backups
Exploiting the information that is recorded in
files
- Implement access authority settings for the files in
which information is saved
File corruption
- Implement access authority settings for the files