STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM zVM Using CA VM:Secure Security Technical Implementation Guide

V-237965

CAT II (Medium)

The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software.

Rule ID

SV-237965r649735_rule

STIG

IBM zVM Using CA VM:Secure Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local policies restrictions and/or rules. Failure to properly configure and maintain system software and applications on the information system could result in a weakened security posture.

Check Content

Ask the system administrator (SA) for documented procedures and routines for proper configuration management of software.

If there are no procedures or the procedures are not documented and on file with the ISSO, this is a finding.

Fix Text

Develop a procedure for proper configuration of software components.

Include proper maintenance procedures.