Your organization relies on a variety of hardware components from multiple vendors to maintain its data center operations. Recently, a widespread vulnerability was discovered in the supply chain affecting a specific model of server motherboards used in your data center. What is the most effective initial action to mitigate the risk associated with this vulnerability?
Conduct an internal risk assessment to evaluate the impact of the vulnerability.
Train staff to recognize the signs of a compromised server that could result from this vulnerability.
Switch to a different hardware vendor not affected by the vulnerability.
Check for and apply official security patches from the affected hardware vendor.
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts