z/OS NetView for ACF2 Security Technical Implementation Guide

Overview

VersionDateFinding Count (5)Downloads
72025-02-25CAT I (High): 0CAT II (Medium): 5CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC II - Mission Support Sensitive

Finding IDSeverityTitleDescription
V-224327
LOWMEDIUMHIGH
NetView configuration/parameter values must be specified properly.NetView configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified,...
V-224328
LOWMEDIUMHIGH
NetView install data sets are not properly protected.NetView Install data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access...
V-224329
LOWMEDIUMHIGH
NetView STC data sets are not properly protected.NetView STC data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to ...
V-224330
LOWMEDIUMHIGH
NetView resources must be properly defined and protected.NetView can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resour...
V-224331
LOWMEDIUMHIGH
NetView Started Task name must be properly identified / defined to the system ACP.NetView requires a started task(s) that will be restricted to certain resources, datasets and other system functions. By defining the started task as ...