| V-224578 | | BMC CONTROL-D configuration/parameter values are not specified properly. | BMC CONTROL-D configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly spec... |
| V-224579 | | BMC CONTROL-D security exits are not installed or configured properly. | The BMC CONTROL-D security exits enable access authorization checking to BMC CONTROL-D commands, features, and online functionality. If these exit(s) ... |
| V-224580 | | BMC CONTROL-D installation data sets will be properly protected. | BMC CONTROL-D installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict a... |
| V-224581 | | BMC CONTROL-D STC data sets must be properly protected. | BMC CONTROL-D STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to ... |
| V-224582 | | BMC CONTROL-D user data sets must be properly protected. | BMC CONTROL-D User data sets, CDAM and Repository, have the ability to use privileged functions and/or have access to sensitive data. Failure to prope... |
| V-224583 | | BMC CONTROL-D resources must be properly defined and protected. | BMC CONTROL-D can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product ... |
| V-224584 | | BMC CONTROL-D Started Task name is not properly identified/defined to the system ACP. | BMC CONTROL-D requires a started task that will be restricted to certain resources, data sets, and other system functions. Defining the started task a... |
| V-224585 | | BMC CONTROL-D Started task(s) must be properly defined to the Started Task Table ACID for Top Secret. | Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to ... |
| V-224586 | | BMC CONTROL-D is not properly defined to the Facility Matrix Table for Top Secret. | Improperly defined security controls for the BMC CONTROL-D could result in the compromise of the network, operating system, and customer data.... |