Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-7546 | AAMV0014 | SV-8019r2_rule | VIVM-1 | Medium |
Description |
---|
Vendors' code may contain vulnerabilities that may be exploited to cause denial of service or to violate the integrity of the system or data on the System. Most vendors develop patches to correct these vulnerabilities. When vendors' products become unsupported, the creation of these patches cease leaving the system exposed to any future vulnerabilities not patched. |
STIG | Date |
---|---|
z/OS ACF2 STIG | 2015-03-27 |
Check Text ( C-20495r1_chk ) |
---|
a) Refer to Vulnerability Questions within the SRRAUDIT Dialog Management document. Check with the Systems programmer to make sure that documented procedures exist to monitor the software products in the Supported Software Version Release Table in the z/OS STIG Addendum to verify dates it will become unsupported and to notify management to start procedures to upgrade to supported versions of the products before that date. Automated Analysis Refer to the following report produced by the z/OS Data Collection: - PDI(AAMV0014) b) If documented procedures exist to monitor products in the Supported Software Version Release Table in the z/OS STIG Addendum for dates they will become unsupported and to notify management to upgrade to supported versions of the products, there is NO FINDING. c) If documented procedures do not exist to monitor products in the Supported Software Version Release Table in the z/OS STIG Addendum for dates they will become unsupported and to notify management to upgrade to supported versions of the products, this is a FINDING. Note: If product support is provided through an outside group or your site, verify that they have a process to notify site of unsupported software. |
Fix Text (F-6895r1_fix) |
---|
The IAO/IAM will verify that a process is documented and followed for unsupported software. |