User guide

Configuration Management Function
1-41
Configuration Management Function
This section describes how to deal with security threats using the Configuration Management function.
Configuration Management Function Usage Model
The following figure shows a typical usage model for the Configuration Management function.
Figure 1-3 Configuration Management Function Usage Model
The Configuration Management function stores operations in the Interstage Management Console
internally. For this reason, users do not need to be aware of the configuration of the configuration
management function. This chapter explains the settings information for the Environment Settings
window in a repository that is available to the system administrator, and also explains security breach
threats.
Resources to be Protected
This section explains the resources that should be protected for the repository that is managed by the
Configuration Management function.
Functions to be Protected
The following functions and procedures should be protected:
Operations using the Interstage Management Console