User guide
Configuration Management Function
1-43
Countermeasures Against Overwriting Information Recorded in Files
Various items of Interstage information are saved in the Configuration Management function repository
in binary format. If the contents of these files are overwritten illegally, it might cause various problems,
such as being unable to run Interstage. To effectively counter this type of threat, implement appropriate
access authority settings for the files in which this information is saved. Regular data backups are also
an effective preventative measure against files being overwritten illegally.
Countermeasures Against Exploiting Information Recorded in Files
Various items of Interstage information are saved in the Configuration Management function repository
in binary format. The descriptive content of these files is also a part of the resources, and it is important
to prevent exploitation. To effectively counter this type of threat, implement appropriate access authority
settings for the files in which this information is saved.
Countermeasures Against File Corruption
In the Configuration Management function repository, there are files that determine the validity of
information based on whether or not a file can be read. If these files are corrupted for some reason,
registered information cannot be referenced. To effectively counter this type of threat, implement
appropriate access authority settings for the files.