The main focus of this small update to the VIVA2 add-on is the reporting of protection requirement values and the corresponding inheritance. The internal calculation of protection requirement inheritance has been revised and corrected.

New features of the VIVA2 3.2.4 update in detail:

Revision of the inheritance of protection requirements

If protection requirements are reduced (recognisable by the red marking), the reduced value was not inherited according to the maximum principle. This problem has now been fixed.

New reporting options for protection requirements inheritance

In the new version, two new fields have been introduced that can be used to display the complete inheritance of protection requirements or the inherited protection requirements in reports. The two new fields ‘Protection requirement inheritance complete’ and ‘Inherited protection requirement’ are integrated via the ‘Information network’ category (not ‘Protection requirement’!).

New variable report ‘IT-Grundschutz-Check (complete)

There is now a new report-based user-defined category ‘Report: IT-Grundschutz-Check (complete)’, which displays all fields of the ‘IT-Grundschutz-Check’ category. The category is intended for display on the ‘Information group’ object type, but is not automatically linked to this by the installation, as the less extensive ‘Report: IT-Grundschutz-Check’ category is sufficient for most users.

New variable report ‘IT-Grundschutz-Check (complete)

There is now a new report-based user-defined category ‘Report: IT-Grundschutz-Check (complete)’, which displays all fields of the ‘IT-Grundschutz-Check’ category. The category is intended for display on the ‘Information group’ object type, but is not automatically linked to this by the installation, as the less extensive ‘Report: IT-Grundschutz-Check’ category is sufficient for most users.

Bug fixes

As in every release, the open bugs have been fixed. A complete list of all changes and fixed bugs can be found in the CHANGELOG.

premium partner

becon is an i-doit Premium Partner, Certified Support Partner and Development Partner of synetics GmbH and thus offers an all-round carefree package.

Seal and award for becon GmbH as "i-doit Best Performing Partner 2022"

Service Management

Thei-doit Compliance Suite gathers all important tools for your IT security in one place: CMDB, ISMS, data protection and change management

Information security with ISMS in i-doit

Information security affects every company. Protect your valuable data with standards and norms such as ISO 27001 and IT Grundschutz from the BSI. Standards help to proactively counter threats from outside and inside. Minimize the risk and thereby increase the security of your company. Monitor your processes by using meaningful reports. Benefit from the integration of a CMDB and numerous extensions to automate your IT documentation.

Subscribe to our blog!

We will not only talk about us here, but above all provide interesting information about the transformation of IT with all its technological facets.


blog

Related blog articles

Security Operations with Wazuh – Fast and effective incident response

Security Operations with Wazuh – Fast and effective incident response

An efficient response to security incidents is crucial. Companies must not only be able to detect threats in real time, but also respond immediately to minimize damage. In this third part of our blog series, we show how Wazuh helps companies to efficiently manage security incidents and optimize their security operations.

Contact

Instant contact

Do you have any questions, suggestions, requests or are you facing a particular challenge? We look forward to hearing from you!