Version | Date | Finding Count (2) | ||
---|---|---|---|---|
6 | 2022-10-10 | CAT I (High): 0 | CAT II (Med): 2 | CAT III (Low): 0 |
STIG Description |
---|
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. |
Finding ID | Severity | Title | Description |
---|---|---|---|
V-224625 | Medium | CA MICS Resource Management User data sets must be properly protected. | CA MICS Resource Management User datasets contain sensitive data obtained through the MICS data collection process. Failure to properly identify and restrict access to these data sets could result... |
V-224624 | Medium | CA MICS Resource Management User data sets must be properly protected. | CA MICS Resource Management User data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in... |