STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide

V-255765

CAT II (Medium)

Applications used for nonlocal maintenance sessions using the MQ Appliance WebGUI must implement cryptographic mechanisms to protect the confidentiality and integrity of nonlocal maintenance and diagnostic communications.

Rule ID

SV-255765r961554_rule

STIG

IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-002890CCI-003123

Discussion

This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions. Satisfies: SRG-APP-000411-NDM-000330, SRG-APP-000412-NDM-000331

Check Content

Log on to the MQ Appliance CLI as a privileged user. 

Display the SSL Server Profile associated with the WebGUI (CLI). Enter: 
co 
show web-mgmt 

Verify the following: 
An ssl-server is associated with the WebGUI. 
[Note the name of the ssl-server.] 

List parameters of the SSL Server (CLI). Enter: 
co 
crypto 
ssl-server <ssl-server name> 
show 

Verify the following: 
protocols TLSv1d2

If TLS protocol is not configured for use with the ssl-server, this is a finding.

Fix Text

Log on to the MQ Appliance CLI as a privileged user. 

Display the SSL Server Profile associated with the WebGUI (CLI). Enter: 
co 
show web-mgmt 

[Note the name of the ssl-server.] 

Define the cache parameters of the SSL Server (CLI). Enter: 
co 
crypto 
ssl-server <ssl-server name> 
protocols TLSv1d2 
exit 
exit 
write mem 
y