COI Report – Part VII
Page
384 of
425 47.1.4 Risk assessment and prioritisation 1119. The policy should
acknowledge limited resources, which make it unfeasible to purchase and install all upgrades immediately, and address the fact that administrators will need to prioritise the deployment of new upgrades, by performing a risk assessment to determine which software should be upgraded first.
1120.
In general, this prioritisation should be based on the following criteria ab Threatb – A threat is any potential direct danger to information systems, or software that is exposed to a higher degree of risk (
e.g. by virtue of its exposure to the internet. Special focus must be placed on upgrading of email applications, as email attacks are now the most common vector for initial intrusions into systems. b)
Share with your friends: