UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IBM z/OS must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.


Overview

Finding ID Version Rule ID IA Controls Severity
V-98287 RACF-OS-000340 SV-107391r1_rule Medium
Description
Operating systems handling data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Satisfies: SRG-OS-000404-GPOS-00183, SRG-OS-000405-GPOS-00184
STIG Date
IBM z/OS RACF Security Technical Implementation Guide 2020-06-29

Details

Check Text ( C-97123r1_chk )
Determine if IBM's DS880 Disks are in use.

If they are not in use for systems that require data at rest, this is a finding.
Fix Text (F-103963r1_fix)
Employ IBM's DS8880 hardware to ensure full disk encryption.