V-224115 | Medium | BMC CONTROL-M STC data sets will be properly protected. | BMC CONTROL-M STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in violating the... |
V-224114 | Medium | BMC CONTROL-M installation data sets will be properly protected. | BMC CONTROL-M installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in... |
V-224117 | Medium | BMC CONTROL-M User/Application JCL data sets must be properly protected. | BMC CONTROL-M User/Application JCL data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result... |
V-224116 | Medium | BMC CONTROL-M User data sets will be properly protected. | BMC CONTROL-M User data sets, Repository, have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in... |
V-224113 | Medium | BMC CONTROL-M security exits are not installed or configured properly. | The BMC CONTROL-M security exits enable access authorization checking to BMC CONTROL-M commands, features, and online functionality. If these exit(s) is (are) not in place, activities by... |
V-224119 | Medium | BMC CONTROL-M Started Task name is not properly identified / defined to the system ACP. | BMC CONTROL-M requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system ACP, It allows the... |
V-224120 | Medium | BMC CONTROL-M configuration/parameter values must be specified properly. | BMC CONTROL-M configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may... |
V-224118 | Medium | BMC C0NTROL-M resources must be properly defined and protected. | BMC CONTROL-M can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of... |