Hitachi

uCosminexus Application Server Security Management Guide


4.7 Analyzing expected threats

This section analyzes the threats that can be expected for the system, based on the information examined in 4.4 Considering the users of the system and 4.5 Considering the resources handled by the system, and checked in 4.6 Checking the preconditions for a secure system.

Threats expected for the system are as follows.

To protect the system against these threats, implement the countermeasures described in 4.8 Considering countermeasures.

For details about the Entry and Exit Procedure, System Setup Procedure, System Operating Procedure, and End-User Operating Procedure documents, see 4.9 Considering work procedures.