| V-224589 | | BMC CONTROL-O configuration/parameter values are not specified properly. | BMC CONTROL-O configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly spec... |
| V-224590 | | BMC CONTROL-O configuration/parameter values are not specified properly. | BMC CONTROL-O configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly spec... |
| V-224591 | | BMC CONTROL-O security exits are not installed or configured properly. | The BMC CONTROL-O security exits enable access authorization checking to BMC CONTROL-O commands, features, and online functionality. If these exit(s) ... |
| V-224592 | | BMC CONTROL-O installation data sets will be properly protected. | BMC CONTROL-O installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict a... |
| V-224593 | | BMC CONTROL-O STC data sets must be properly protected. | BMC CONTROL-O STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to ... |
| V-224594 | | BMC CONTROL-O resources must be properly defined and protected. | BMC CONTROL-O can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product ... |
| V-224595 | | BMC CONTROL-O Started Task name is not properly identified/defined to the system ACP. | BMC CONTROL-O requires a started task that will be restricted to certain resources, data sets, and other system functions. Defining the started task a... |
| V-224596 | | BMC CONTROL-O Started task(s) must be properly defined to the Started Task Table ACID for Top Secret. | Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to ... |
| V-224597 | | BMC CONTROL-O is not properly defined to the Facility Matrix Table for Top Secret. | Improperly defined security controls for the BMC CONTROL-O could result in the compromise of the network, operating system, and customer data.... |