z/OS BMC CONTROL-D for ACF2 Security Technical Implementation Guide

Overview

VersionDateFinding Count (7)Downloads
V7R22025-09-26CAT I (High): 0CAT II (Medium): 7CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC III - Administrative Public

Finding IDSeverityTitleDescription
V-224106
LOWMEDIUMHIGH
BMC CONTROL-D configuration/parameter values are not specified properly.BMC CONTROL-D configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly spec...
V-224107
LOWMEDIUMHIGH
BMC CONTROL-D security exits are not installed or configured properly.The BMC CONTROL-D security exits enable access authorization checking to BMC CONTROL-D commands, features, and online functionality. If these exit(s) ...
V-224108
LOWMEDIUMHIGH
BMC CONTROL-D installation datasets will be properly protected.BMC CONTROL-D installation datasets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict ac...
V-224109
LOWMEDIUMHIGH
BMC CONTROL-D STC datasets must be properly protected.BMC CONTROL-D STC datasets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to t...
V-224110
LOWMEDIUMHIGH
BMC CONTROL-D user datasets must be properly protected.BMC CONTROL-D User datasets, CDAM and Repository, have the ability to use privileged functions and/or have access to sensitive data. Failure to proper...
V-224111
LOWMEDIUMHIGH
BMC CONTROL-D resources will be properly defined and protected.BMC CONTROL-D can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product ...
V-224112
LOWMEDIUMHIGH
BMC CONTROL-D Started Task name is not properly identified/defined to the system ACP.BMC CONTROL-D requires a started task that will be restricted to certain resources, datasets, and other system functions. Defining the started task as...