Skip to content

IBM zVM Using CA VM:Secure Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software.

    Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local policies restrictions and/or rules. Failure to prope...
    Rule Medium Severity
  • IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts.

    Proper handling of temporary, inactive, and emergency accounts require automatic notification and action rather than at the convenience of the systems administrator. However in the absence of autom...
    Rule Medium Severity
  • The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules