The main focus of this small update to the VIVA2 add-on is the reporting of protection requirement values and the corresponding inheritance. The internal calculation of protection requirement inheritance has been revised and corrected.
New features of the VIVA2 3.2.4 update in detail:
Revision of the inheritance of protection requirements
If protection requirements are reduced (recognisable by the red marking), the reduced value was not inherited according to the maximum principle. This problem has now been fixed.
New reporting options for protection requirements inheritance
In the new version, two new fields have been introduced that can be used to display the complete inheritance of protection requirements or the inherited protection requirements in reports. The two new fields ‘Protection requirement inheritance complete’ and ‘Inherited protection requirement’ are integrated via the ‘Information network’ category (not ‘Protection requirement’!).
New variable report ‘IT-Grundschutz-Check (complete)
There is now a new report-based user-defined category ‘Report: IT-Grundschutz-Check (complete)’, which displays all fields of the ‘IT-Grundschutz-Check’ category. The category is intended for display on the ‘Information group’ object type, but is not automatically linked to this by the installation, as the less extensive ‘Report: IT-Grundschutz-Check’ category is sufficient for most users.
New variable report ‘IT-Grundschutz-Check (complete)
There is now a new report-based user-defined category ‘Report: IT-Grundschutz-Check (complete)’, which displays all fields of the ‘IT-Grundschutz-Check’ category. The category is intended for display on the ‘Information group’ object type, but is not automatically linked to this by the installation, as the less extensive ‘Report: IT-Grundschutz-Check’ category is sufficient for most users.
Bug fixes
As in every release, the open bugs have been fixed. A complete list of all changes and fixed bugs can be found in the CHANGELOG.
premium partner
becon is an i-doit Premium Partner, Certified Support Partner and Development Partner of synetics GmbH and thus offers an all-round carefree package.
Service Management
Thei-doit Compliance Suite gathers all important tools for your IT security in one place: CMDB, ISMS, data protection and change management
Information security with ISMS in i-doit
Information security affects every company. Protect your valuable data with standards and norms such as ISO 27001 and IT Grundschutz from the BSI. Standards help to proactively counter threats from outside and inside. Minimize the risk and thereby increase the security of your company. Monitor your processes by using meaningful reports. Benefit from the integration of a CMDB and numerous extensions to automate your IT documentation.
Subscribe to our blog!
We will not only talk about us here, but above all provide interesting information about the transformation of IT with all its technological facets.
blog
Related blog articles
NIS2: Challenges and solutions for industries with critical infrastructures
The NIS2 Directive comes into force in October 2024 and tightens cybersecurity requirements for a large number of industries across Europe. Its aim is to better protect critical infrastructure and digital services from cyberattacks.