STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to CA IDMS Security Technical Implementation Guide

V-251591

CAT II (Medium)

All installation-delivered IDMS Developer-level Programs must be properly secured.

Rule ID

SV-251591r960792_rule

STIG

CA IDMS Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000213, CCI-001082

Discussion

Developer-level programs that are not secured may allow unauthorized users to access and manipulate various resources within the DBMS. Satisfies: SRG-APP-000033-DB-000084, SRG-APP-000211-DB-000122

Check Content

The following are developer-level batch programs and are executed using JCL rather than the CV. As batch programs, they need to be secured in the external security manager (ESM) rather than through the SRTT.

Validate the following suggested developer-level programs are secured by the ESM.
ADSOBCOM
ADSORPTS
IDMSDMLA
IDMSDMLC
IDMSDMLP
IDMSLOOK
IDMSRPTS
RHDCMAP1
RHDCMPUT   
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      
Contact the security office to confirm that the programs in this list are secured. If they are not, this is a finding.

Fix Text

Contact the security office to confirm that the programs in this list are secured via the ESM and assigned to the appropriate users. Each program in the list must be secured.