UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

CA VM:Secure product CONFIG file must be restricted to appropriate personnel.


Overview

Finding ID Version Rule ID IA Controls Severity
V-78967 IBMZ-VM-001250 SV-93673r1_rule Medium
Description
Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system. Security-related parameters are those parameters impacting the security state of the system, including the parameters required to satisfy other security control requirements. Security-related parameters include, for example: registry settings; account, file, directory permission settings; and settings for functions, ports, protocols, services, and remote connections.
STIG Date
IBM z/VM Using CA VM:Secure Security Technical Implementation Guide 2017-12-11

Details

Check Text ( C-78553r1_chk )
Query the CA VM:Secure Product rules.

If there are product rules granting access to the disk on which the product “CONFIG” file resides for system administrators only, this is not a finding.
Fix Text (F-85717r1_fix)
Create rules in the CA VM:Secure product Rules Facility that restricts access to the disk where the product “CONFIG” file resides to system administrators only.