Checklist icon
Checklist

THREATS AND VULNERABILITIES

Log4j Remediation Checklist

by Tanya Janca

Log4j is an open source Java logging library that was recently found to have a vulnerability (CVE-2021-44228) allowing an attacker to take over a web server (or any device it runs on) and run commands from the device.

Download this detailed checklist for best practices to find, judge and fix Log4j exploits in your custom applications to prevent web server attacks as well as keep end users and the organization safe during the remediation process.


Complete the form and we will send a copy of the Log4j Remediation Checklist to your inbox.

Fill out the form to receive your content download.  
* Required Fields
 

Featured IANS Content

Report icon
Report

Management and Leadership

Executive Competencies for InfoSec Leaders

by IANS Research

Use our 'Essential Guide: Ransomware Response & Prevention' from IANS Faculty, Ondrej Krehe, to help prevent and remediate damage from a ransomware attack.

See Details
Checklist icon
Checklist

Incident Response and Recovery

Global Political Crisis Response Checklist

by Josh More

Use our Global Political Crisis Response Checklist from IANS Faculty, Josh More to take a tiered approach following a global political crisis outside your local region.

See Details