z/OS BMC CONTROL-M for RACF Security Technical Implementation Guide

Overview

VersionDateFinding Count (9)Downloads
V7R2
2 versions →
2025-09-27CAT I (High): 0CAT II (Medium): 9CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-224396
LOWMEDIUMHIGH
BMC CONTROL-M security exits are not installed or configured properly.The BMC CONTROL-M security exits enable access authorization checking to BMC CONTROL-M commands, features, and online functionality. If these exit(s) ...
V-224397
LOWMEDIUMHIGH
BMC CONTROL-M installation data sets will be properly protected.BMC CONTROL-M installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict a...
V-224398
LOWMEDIUMHIGH
BMC CONTROL-M STC data sets will be properly protected.BMC CONTROL-M STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to ...
V-224399
LOWMEDIUMHIGH
BMC CONTROL-M User data sets will be properly protected.BMC CONTROL-M User data sets, Repository, have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restr...
V-224400
LOWMEDIUMHIGH
BMC CONTROL-M User/Application JCL data sets must be properly protected.BMC CONTROL-M User/Application JCL data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly re...
V-224401
LOWMEDIUMHIGH
BMC C0NTROL-M resources must be properly defined and protected.BMC CONTROL-M can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product ...
V-224402
LOWMEDIUMHIGH
BMC CONTROL-M Started Task name is not properly identified/defined to the system ACP.BMC CONTROL-M requires a started task that will be restricted to certain resources, data sets, and other system functions. Defining the started task a...
V-224403
LOWMEDIUMHIGH
BMC CONTROL-M Started task(s) must be properly defined to the STARTED resource class for RACF.Access to product resources must be restricted to only individuals responsible for the application connectivity and who have a requirement to access t...
V-224404
LOWMEDIUMHIGH
BMC CONTROL-M configuration/parameter values must be specified properly.BMC CONTROL-M configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly spec...