UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Hardware Management Console must be located in a secure location.


Overview

Finding ID Version Rule ID IA Controls Severity
V-24345 HMC0010 SV-29999r1_rule PECF-1 PECF-2 PEPF-1 PEPF-2 High
Description
The Hardware Management Console is used to perform Initial Program Load (IPLs) and control the Processor Resource/System Manager (PR/SM). If the Hardware Management Console is not located in a secure location, unauthorized personnel can bypass security, access the system, and alter the environment. This can lead to loss of secure operations if not corrected immediately.
STIG Date
IBM Hardware Management Console (HMC) STIG 2013-06-26

Details

Check Text ( C-2873r1_chk )
Verify the location of the Hardware Management Console.

It should be located in a controlled area.
Access to it should be restricted.

If the Hardware Management Console is not located in a secure location this is a FINDING.
Fix Text (F-2339r1_fix)
Move the Hardware Management Console to a secure location and implement access controls for authorized personnel.