T 2.64 Lack of rules for the RAS system
This threat was eliminated in 2008 with the 10th version of the IT-Grundschutz Catalogues. All relevant content has been integrated into T 2.129 Lack of, or insufficient, rules for the use of VPNs.
This threat was eliminated in 2008 with the 10th version of the IT-Grundschutz Catalogues. All relevant content has been integrated into T 2.129 Lack of, or insufficient, rules for the use of VPNs.