Skip to content

IDMS must support the implementation of an external security manager (ESM) to handle account management and user accesses, etc.

An XCCDF Rule

Description

<VulnDiscussion>Internal security in a DBMS can be complex to implement and maintain with the increased possibility of no access or the wrong access to a needed resource. IDMS can be configured to use an ESM as the security repository allowing access rules to be added to already-known users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-251583r807616_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

The SRTT module must be coded to enable the desired security. When using an ESM, this could be done in the following manner:
 
#SECRTT TYPE=ENTRY,                          X
 RESTYPE=SGON,                                      X
 SECBY=EXTERNAL ,                               X
 EXTNAME=(RESNAME),                      X