UCF STIG Viewer Logo

Access to the Hardware Management Console must be restricted to only authorized personnel.


Overview

Finding ID Version Rule ID IA Controls Severity
V-24349 HMC0040 SV-30008r1_rule ECLP-1 PECF-1 PECF-2 PRMP-1 PRMP-2 Medium
Description
Access to the Hardware Management Console if not properly restricted to authorized personnel could lead to a bypass of security, access to the system, and an altering of the environment. This would result in a loss of secure operations and can cause an impact to data operating environment integrity.
STIG Date
IBM HARDWARE MANAGEMENT CONSOLE (HMC) STIG 2014-04-10

Details

Check Text ( C-30366r1_chk )
Verify that sign-on access to the Hardware Management Console is restricted to authorize personnel and that a DD2875 is on file for each user ID.

Note: Sites must have a list of valid HMC users, indicating their USER IDs, Date of DD2875, and roles and responsibilities

To display user roles chose User Profiles and then select the user for modification. View Task Roles and Manager Resources Roles.

If each user displayed by the System Administrator does not have a DD2875, then this is a FINDING.

Fix Text (F-26667r1_fix)
The System Administrator will see that sign-on access to the Hardware Management Console is restricted to authorized personnel and that a DD2875 is on file for each user ID.

Note: Sites must have a list of valid HMC users, indicating their USER IDs, Date of DD2875, and roles and responsibilities.

The System Administrator must see that the list and users defined to the Hardware Management Console match.