CA IDMS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The online debugger which can change programs and storage in the CA IDMS address space must be secured.
If the DBMS were to allow any user to make changes to database structure or logic, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of ...Rule Medium Severity -
CA IDMS must secure the ability to create, alter, drop, grant, and revoke user and/or system profiles to users or groups.
Even when using an external security manager (ESM), IDMS system and user profiles which reside in an IDMS user catalog may be assigned to users or groups. The ability to administer user and system ...Rule Medium Severity -
SRG-APP-000141-DB-000090
Group -
The EMPDEMO databases, database objects, and applications must be removed.
Demonstration and sample database objects and applications present publicly known attack points for malicious users. These demonstration and sample objects are meant to provide simple examples of c...Rule Low Severity -
SRG-APP-000141-DB-000091
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules