z/OS Quest NC-Pass for ACF2 Security Technical Implementation Guide
Overview
| Version | Date | Finding Count (4) | Downloads | ||
| V7R2 2 versions → | 2025-09-26 | CAT I (High): 0 | CAT II (Medium): 4 | CAT III (Low): 0 | |
| STIG Description |
| This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Findings - All
| Finding ID | Severity | Title | Description |
|---|---|---|---|
| V-224332 | Quest NC-Pass installation datasets will be properly protected. | Quest NC-Pass installation datasets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict ac... | |
| V-224333 | Quest NC-Pass STC datasets will be properly protected. | Quest NC-Pass STC datasets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to t... | |
| V-224334 | Quest NC-Pass will be used by Highly-Sensitive users. | DISA has directed that Quest NC-Pass extended authentication be implemented on all domains. All users with update and alter access to sensitive system... | |
| V-224335 | Quest NC-Pass Started Task name will be properly identified and/or defined to the system ACP. | Quest NC-Pass requires a started task that will be restricted to certain resources, datasets, and other system functions. Defining the started task as... |