STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM Hardware Management Console (HMC) Security Technical Implementation Guide

V-256868

CAT I (High)

The Hardware Management Console must be located in a secure location.

Rule ID

SV-256868r991589_rule

STIG

IBM Hardware Management Console (HMC) Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000366

Discussion

The Hardware Management Console is used to perform Initial Program Load (IPLs) and control the Processor Resource/System Manager (PR/SM). If the Hardware Management Console is not located in a secure location, unauthorized personnel can bypass security, access the system, and alter the environment. This can lead to loss of secure operations if not corrected immediately.

Check Content

Verify the location of the Hardware Management Console.

It should be located in a controlled area.
Access to it should be restricted.

If the Hardware Management Console is not located in a secure location this is a FINDING.

Fix Text

Move the Hardware Management Console to a secure location and implement access controls for authorized personnel.