z/OS NetView for TSS Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (7) | Downloads | ||
| V7R2 | 2025-09-28 | CAT I (High): 0 | CAT II (Medium): 7 | CAT III (Low): 0 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - MAC III - Administrative Classified
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-225580 | NetView configuration/parameter values must be specified properly. | NetView configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified,... | |
| V-225581 | NetView install data sets are not properly protected. | NetView install data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access... | |
| V-225582 | NetView STC data sets are not properly protected. | NetView STC data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to ... | |
| V-225583 | NetView resources must be properly defined and protected. | NetView can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resour... | |
| V-225584 | NetView Started Task name(s) is not properly identified/defined to the system ACP. | NetView requires a started task(s) that will be restricted to certain resources, data sets, and other system functions. Defining the started task as a... | |
| V-225585 | IBM Tivoli NetView Started task(s) must be properly defined to the Started Task Table ACID for Top Secret. | Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to... | |
| V-225586 | NetView is not properly defined to the Facility Matrix Table for Top Secret. | Improperly defined security controls for the Product could result in the compromise of the network, operating system, and customer data.... |