UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IBM z/OS must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest on all operating system components.


Overview

Finding ID Version Rule ID IA Controls Severity
V-223790 RACF-OS-000340 SV-223790r557657_rule Medium
Description
Operating systems handling data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Satisfies: SRG-OS-000404-GPOS-00183, SRG-OS-000405-GPOS-00184
STIG Date
IBM z/OS RACF Security Technical Implementation Guide 2020-10-09

Details

Check Text ( C-25463r557656_chk )
Determine if IBM's DS8880 Disks are in use.

If they are not in use for systems that require data at rest, this is a finding.
Fix Text (F-25451r515059_fix)
Employ IBM's DS8880 hardware to ensure full disk encryption.