💼 40 An important aspect of information asset life-cycle management involves minimising vulnerabilities and maintaining support. Information security exposures could arise from hardware and software which is outdated or has limited or no support (whether through a third party, a related party or in-house). Technology that is end-of-life5 , out-of-support or in extended support is typically less secure by design, has a dated security model and can take longer, or is unable, to be updated to address new threats.
- Contextual name: 💼 40 An important aspect of information asset life-cycle management involves minimising vulnerabilities and maintaining support. Information security exposures could arise from hardware and software which is outdated or has limited or no support (whether through a third party, a related party or in-house). Technology that is end-of-life5 , out-of-support or in extended support is typically less secure by design, has a dated security model and can take longer, or is unable, to be updated to address new threats.
- ID:
/frameworks/apra-cpg-234/15/40
- Located in: 💼 15 Implementation of controls - End-of-life and out-of-support issues
Description
Empty...
Similar
- Internal
- ID:
dec-c-f5fc5d30
- ID:
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (6)
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-0d66ed99 | 1 | |
✉️ dec-x-879aa996 | 1 | |
✉️ dec-x-215302da | 1 | |
✉️ dec-x-345591b3 | 1 | |
✉️ dec-x-a20e54a0 | 1 | |
✉️ dec-x-f82b9849 | 1 |