|Finding ID||Version||Rule ID||IA Controls||Severity|
|Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It also permits outbound connections that may facilitate exfiltration of DoD data.|
|IBM z/OS RACF Security Technical Implementation Guide||2022-09-19|
|Check Text ( C-25453r515028_chk )|
| Examine the policy agent policy statements. |
If it can be determined that the policy agent employs a deny-all, allow-by exception firewall policy for allowing connections to other systems this is not a finding.
|Fix Text (F-25441r515029_fix)|
|Develop a policy application and policy agent to employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.|