Critical Systems Inventory

Jeff Bollinger jeff01 at
Wed Jan 30 21:49:09 GMT 2002

What are some of you doing to keep track of critical systems on your 
campuses, as in, do you maintain a database(s) of systems that may 
contain sensitive material and/or have to be given special consideration 
before, say, being removed from the network because of an obvious 
compromise?  If you do maintain a database, what sort of information do 
you keep other than system name, IP address, the reason it's critical, 
and the administrator's contact information?  How are your procedures 
delineated when a system that has been deemed "critical" gets 
compromised and needs immediate attention (24/7)?


Jeff Bollinger
University of North Carolina
IT Security Analyst
105 Abernethy Hall
mailto: jeff_bollinger at unc dot edu

More information about the unisog mailing list