STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to STIGs

z/OS Front End Processor for ACF2 Security Technical Implementation Guide

Version

V7R2

Release Date

Sep 27, 2025

SCAP Benchmark ID

zOS_FEP_for_ACF2_STIG

Total Checks

5

Tags

other
CAT I: 0CAT II: 5CAT III: 0

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Export CKLExport CSVExport JSON

Checks (5)

V-230183MEDIUMAll hardware components of the FEPs are not placed in secure locations where they cannot be stolen, damaged, or disturbedV-230185MEDIUMA documented procedure is not available instructing how to load and dump the FEP NCP (Network Control Program).V-230186MEDIUMAn active log is not available to keep track of all hardware upgrades and software changes made to the FEP (Front End Processor).V-230187MEDIUMNCP (Net Work Control Program) dataset access authorization does not restricts UPDATE and/or ALLOCATE access to appropriate personnel.V-230188MEDIUMA password control is not in place to restrict access to the service subsystem via the operator consoles (local and/or remote) and a key-lock switch is not used to protect the modem supporting the remote console of the service subsystem.