Checklist icon


Log4j Remediation Checklist

by Tanya Janca

Log4j is an open source Java logging library that was recently found to have a vulnerability (CVE-2021-44228) allowing an attacker to take over a web server (or any device it runs on) and run commands from the device.

Download this detailed checklist for best practices to find, judge and fix Log4j exploits in your custom applications to prevent web server attacks as well as keep end users and the organization safe during the remediation process.

Complete the form and we will send a copy of the Log4j Remediation Checklist to your inbox.

Fill out the form to receive your content download.  
* Required Fields

Featured IANS Content

Report icon

Management and Leadership

Executive Competencies for InfoSec Leaders

by IANS Research

Use our 'Essential Guide: Ransomware Response & Prevention' from IANS Faculty, Ondrej Krehe, to help prevent and remediate damage from a ransomware attack.

See Details
Checklist icon

Incident Response and Recovery

Global Political Crisis Response Checklist

by Josh More

Use our Global Political Crisis Response Checklist from IANS Faculty, Josh More to take a tiered approach following a global political crisis outside your local region.

See Details