STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub·STIGs updated 2 days ago
Powered by Pylon·© 2026 Beacon Cloud Solutions, Inc.
← Back to z/OS BMC CONTROL-D for TSS Security Technical Implementation Guide

V-224578

CAT II (Medium)

BMC CONTROL-D configuration/parameter values are not specified properly.

Rule ID

SV-224578r1145894_rule

STIG

z/OS BMC CONTROL-D for TSS Security Technical Implementation Guide

Version

V7R2

CCIs

CCI-000381

Discussion

BMC CONTROL-D configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.

Check Content

Refer to the following applicable report produced by the z/OS Data Collection:

- IOA.RPT(SECPARM).

Automated Analysis
Refer to the following report produced by the z/OS Data Collection:

- PDI(ZCTD0040).

If the following keywords specify the values in the BMC CONTROL-D security parameter member, this is not a finding.

Keyword	Value
DEFMCHKD	$$CTDEDM
SECTOLD	NO
DFMD01	EXTEND
DFMD04	EXTEND
DFMD08	EXTEND
DFMD19	EXTEND
DFMD23	EXTEND
DFMD24	EXTEND
DFMD26	EXTEND
DFMD27	EXTEND

Fix Text

The BMC CONTROL-D systems programmer will verify that any configuration/parameters that are required to control the security of the product are properly configured and syntactically correct. Set the standard values for the BMC CONTROL-D security parameters for the specific ACP environment along with additional IOA security parameters with standard values as documented below.

Keyword	Value
DEFMCHKD	$$CTDEDM
SECTOLD	NO
DFMD01	EXTEND
DFMD04	EXTEND
DFMD08	EXTEND
DFMD19	EXTEND
DFMD23	EXTEND
DFMD24	EXTEND
DFMD26	EXTEND
DFMD27	EXTEND