Vvulnerability Management
- Tags
- Monitoring
- Target group
- Administrators
- Service provider
- SG3.5 (ZUV)
Typical causes for security vulnerabilities are misconfigurations, programming errors, faulty installations or insufficient maintenance. With the service Vulnerability Management, the IT infrastructure of the TU Dresden can be systematically checked for such risks. As a result of the check, the responsible administrator receives a detailed overview and evaluation of the existing security vulnerabilities according to current standards. In addition, recommendations are given for remedying or preventing exploitation. Translated with www.DeepL.com/Translator
Protection level according to the Federal Office for Information Security (BSI) This service is permitted up to the protection level shown below. You can find further information on the respective page or in the provided document. Protection level: high
Prerequisites 2-Faktor-Authentifizierung
Provision time The time required to prepare the service for use. ca. 2 workdays
Subject to charges no
Service access https://gsm.cert.tu-dresden.de
Operating time You can access the service during the times given below. 24/7
Further information for this service (e.g. a manual or other instructions) is available.