STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM zVM Using CA VM:Secure Security Technical Implementation Guide

V-237958

CAT II (Medium)

CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel.

Rule ID

SV-237958r859050_rule

STIG

IBM zVM Using CA VM:Secure Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security baseline across DoD that reflects the most restrictive security posture consistent with operational requirements.

Check Content

Query the CA VM:Secure product rules.

If there are product rules granting access to the disk on which the "DASD CONFIG" file resides for system administrators or DASD administrators only, this is not a finding.

Fix Text

Create rules in the CA VM:Secure product Rules Facility that restricts access to the disk where the "DASD CONFIG" file resides to system administrators or DASD administrators only.