z/OS Quest NC-Pass for ACF2 Security Technical Implementation Guide

Overview

VersionDateFinding Count (4)Downloads
72025-02-25CAT I (High): 0CAT II (Medium): 4CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Sensitive

Finding IDSeverityTitleDescription
V-224332
LOWMEDIUMHIGH
Quest NC-Pass installation data sets will be properly protected.Quest NC-Pass installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict a...
V-224333
LOWMEDIUMHIGH
Quest NC-Pass STC data sets will be properly protected.Quest NC-Pass STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to ...
V-224334
LOWMEDIUMHIGH
Quest NC-Pass will be used by Highly-Sensitive users.DISA has directed that Quest NC-Pass extended authentication be implemented on all domains. All users with update and alter access to sensitive system...
V-224335
LOWMEDIUMHIGH
Quest NC-Pass Started Task name will be properly identified and/or defined to the system ACP.Quest NC-Pass requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task ...