Skip to main content

💼 40 An important aspect of information asset life-cycle management involves minimising vulnerabilities and maintaining support. Information security exposures could arise from hardware and software which is outdated or has limited or no support (whether through a third party, a related party or in-house). Technology that is end-of-life5 , out-of-support or in extended support is typically less secure by design, has a dated security model and can take longer, or is unable, to be updated to address new threats.

  • Contextual name: 💼 40 An important aspect of information asset life-cycle management involves minimising vulnerabilities and maintaining support. Information security exposures could arise from hardware and software which is outdated or has limited or no support (whether through a third party, a related party or in-house). Technology that is end-of-life5 , out-of-support or in extended support is typically less secure by design, has a dated security model and can take longer, or is unable, to be updated to address new threats.
  • ID: /frameworks/apra-cpg-234/15/40
  • Located in: 💼 15 Implementation of controls - End-of-life and out-of-support issues

Description

Empty...

Similar

  • Internal
    • ID: dec-c-f5fc5d30

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (6)

PolicyLogic CountFlags
📝 AWS DMS Replication Instance Auto Minor Version Upgrade is not enabled 🟢1🟢 x6
📝 AWS RDS Instance Auto Minor Version Upgrade is not enabled 🟠🟢1🟠 x1, 🟢 x6
📝 Azure App Service does not run the latest HTTP version 🟢1🟢 x6
📝 Azure App Service does not run the latest Java version 🟢🟢 x3
📝 Azure App Service does not run the latest PHP version 🟢🟢 x3
📝 Azure App Service does not run the latest Python version 🟢🟢 x3

Internal Rules

RulePoliciesFlags
✉️ dec-x-0d66ed991
✉️ dec-x-879aa9961
✉️ dec-x-215302da1
✉️ dec-x-345591b31
✉️ dec-x-a20e54a01
✉️ dec-x-f82b98491