HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.93 Permitting use of RAS components by third parties

T 5.93 Permitting use of RAS components by third parties

If RAS components are deliberately made available to unauthorised persons, then the security of the RAS system can no longer be assured (see also T 3.30 Unauthorised private use of telecommuting workstations). The resulting possible threats are set out below.

The possibility that IT systems in remote locations will be used by third parties can never be excluded as the security mechanisms of an IT system can be circumvented once physical access has occurred.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home