Read Time:15 Second
Description
The product’s architecture mirrors regions without ensuring that their contents always stay in sync.
Modes of Introduction:
Related Weaknesses
Consequences
Confidentiality, Integrity, Availability, Access Control, Accountability, Authentication, Authorization, Non-Repudiation: Varies by Context
Potential Mitigations
Phase: Architecture and Design
Effectiveness: Moderate
Description: