z/OS HCD for ACF2 Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (3) | Downloads | ||
| 7 | 2025-02-25 | CAT I (High): 0 | CAT II (Medium): 3 | CAT III (Low): 0 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - MAC II - Mission Support Classified
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-224299 | IBM Hardware Configuration Definition (HCD) install data sets are not properly protected. | IBM HCD product has the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data se... | |
| V-224300 | IBM Hardware Configuration Definition (HCD) User data sets are not properly protected. | IBM HCD product has the capability to use privileged functions and/or to have access to sensitive data. Failure to properly restrict access to their d... | |
| V-224301 | IBM Hardware Configuration Definition (HCD) resources are not properly defined and protected. | Program products can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to progr... |