Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-24349 | HMC0040 | SV-30008r2_rule | ECLP-1 PECF-1 PECF-2 PRMP-1 PRMP-2 | Medium |
Description |
---|
Access to the Hardware Management Console if not properly restricted to authorized personnel could lead to a bypass of security, access to the system, and an altering of the environment. This would result in a loss of secure operations and can cause an impact to data operating environment integrity. |
STIG | Date |
---|---|
IBM Hardware Management Console (HMC) STIG | 2017-09-28 |
Check Text ( C-30366r1_chk ) |
---|
Verify that sign-on access to the Hardware Management Console is restricted to authorize personnel and that a DD2875 is on file for each user ID. Note: Sites must have a list of valid HMC users, indicating their USER IDs, Date of DD2875, and roles and responsibilities To display user roles chose User Profiles and then select the user for modification. View Task Roles and Manager Resources Roles. If each user displayed by the System Administrator does not have a DD2875, then this is a FINDING. |
Fix Text (F-26667r1_fix) |
---|
The System Administrator will see that sign-on access to the Hardware Management Console is restricted to authorized personnel and that a DD2875 is on file for each user ID. Note: Sites must have a list of valid HMC users, indicating their USER IDs, Date of DD2875, and roles and responsibilities. The System Administrator must see that the list and users defined to the Hardware Management Console match. |