Access to the Hardware Management Console if not properly restricted to authorized personnel could lead to a bypass of security, access to the system, and an altering of the environment. This would result in a loss of secure operations and can cause an impact to data operating environment integrity.
Verify that sign-on access to the Hardware Management Console is restricted to authorize personnel and that a DD2875 is on file for each user ID. <br /><br />Note: Sites must have a list of valid HMC users, indicating their USER IDs, Date of DD2875, and roles and responsibilities<br /><br />To display user roles chose User Profiles and then select the user for modification. View Task Roles and Manager Resources Roles.<br /><br />If each user displayed by the System Administrator does not have a DD2875, then this is a FINDING.<br /><br />
The System Administrator will see that sign-on access to the Hardware Management Console is restricted to authorized personnel and that a DD2875 is on file for each user ID. <br /><br />Note: Sites must have a list of valid HMC users, indicating their USER IDs, Date of DD2875, and roles and responsibilities.<br /><br />The System Administrator must see that the list and users defined to the Hardware Management Console match.<br />