STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide

V-255291

CAT I (High)

The HPE 3PAR OS CIMserver process must be configured to use approved encryption and communications protocols to protect the confidentiality of remote access sessions.

Rule ID

SV-255291r958408_rule

STIG

HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000068CCI-000197CCI-000382CCI-001941

Discussion

Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Encryption provides a means to secure the remote connection to prevent unauthorized access to the data traversing the remote access connection (e.g., RDP), thereby providing a degree of confidentiality. The encryption strength of a mechanism is selected based on the security categorization of the information. The Common Information Model (CIM) protocol, and its associated Service Location Protocol (SLP) represent an additional, optional, management protocol for monitoring and controlling some aspects of the Storage Array. These settings limit the server to communications using TLS1.2. Satisfies: SRG-OS-000033-GPOS-00014, SRG-OS-000096-GPOS-00050, SRG-OS-000112-GPOS-00057, SRG-OS-000074-GPOS-00042

Check Content

If the mission does not require CIM functionality this requirement is not applicable.

Verify if CIMserver is configured to run.
Use the command:
"cli% showcim"

If the Server column shows "Disabled", this is not applicable.

If the HTTP column shows "Enabled", this is a finding.

If the HTTPS column shows "Disabled", this is a finding.

Use the command:
"cli% showcim -pol" to display advanced configuration policies.

If the output contains "no_tls_strict", this is a finding.

Fix Text

Verify if CIMserver is configured to run.
Use the command:
"cli% showcim"

If the Server column shows "Disabled", this is not applicable.

Temporarily stop the server using the command: "cli% stopcim -f"

Disable the HTTP listener, and enable the HTTPS listener, using the command: 
cli% setcim -http disable -https enable

Set the TLS policy to utilize only TLS1.2 with the following command:
cli% setcim -pol tls_strict

Restart the CIMserver using the command:
cli% startcim