CA IDMS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
IDMS must protect against the use web services that do not require a sign on when actions are performed that may be audited.
<VulnDiscussion>IDMS web services provide a way for web-based applications to access an IDMS database. If not secured, the Web services inter...Rule Low Severity -
SRG-APP-000089-DB-000064
<GroupDescription></GroupDescription>Group -
IDMS must use the ESM to generate auditable records for resources when DoD-defined auditable events occur.
<VulnDiscussion>Audit records provide a tool to help research events within IDMS. IDMS does not produce audit records, but when using externa...Rule High Severity -
SRG-APP-000089-DB-000064
<GroupDescription></GroupDescription>Group -
IDMS must use the ESM to generate auditable records for commands and utilities when DoD-defined auditable events occur.
<VulnDiscussion>Audit records provide a tool to help research events within IDMS. IDMS itself does not produce audit records but, when extern...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules