Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
IBM z/OS TSS Security Technical Implementation Guide
SRG-OS-000324-GPOS-00125
The IBM z/OS IEASYMUP resource must be protected in accordance with proper security requirements.
The IBM z/OS IEASYMUP resource must be protected in accordance with proper security requirements.
An XCCDF Rule
Details
Profiles
Prose
The IBM z/OS IEASYMUP resource must be protected in accordance with proper security requirements.
Medium Severity
<VulnDiscussion>Privileged functions include, for example, establishing accounts, performing system integrity checks, or administering cryptographic key management activities. Non-privileged users are individuals that do not possess appropriate authorizations. Circumventing intrusion detection and prevention mechanisms or malicious code protection mechanisms are examples of privileged functions that require protection from non-privileged users.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>