T 3.34 Unsuitable configuration of the management system

In order to securely use a network and/or system management system, a consistent configuration of all components involved is required. The individual components are normally administrated by a central instance (management console), but the management system consists of many individual components distributed to the network components to be administrated. A consistent configuration of such a system can be divided into two areas:

If the consistency of the configurations is violated deliberately or accidentally, the components no longer cooperate smoothly, which may result in security problems. For example, a server could be no longer available or access rights may be set too liberally.