Skip to content

CA IDMS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • IDMS must protect its user catalogs and system dictionaries to prevent unauthorized users from bypassing or updating security settings.

    Unauthorized access to user profiles, dictionaries, and user catalogs provides the ability to damage the IDMS system.
    Rule Medium Severity
  • SRG-APP-000342-DB-000302

    Group
  • SRG-APP-000380-DB-000360

    Group
  • SRG-APP-000383-DB-000364

    Group
  • IDMS terminal and lines that are not secure must be disabled.

    Use of nonsecure network functions, ports, protocols, and services exposes the system to avoidable threats.
    Rule Medium Severity
  • SRG-APP-000431-DB-000388

    Group
  • SRG-APP-000431-DB-000388

    Group
  • CA IDMS must protect system and user code and storage from corruption by user programs.

    Database management systems can maintain separate execution domains for each executing process by assigning each process a separate address space. Each process has a distinct address space so that ...
    Rule Medium Severity
  • SRG-APP-000431-DB-000388

    Group
  • SRG-APP-000441-DB-000378

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules