STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM Hardware Management Console (HMC) Security Technical Implementation Guide

V-256868

CAT I (High)

The Hardware Management Console must be located in a secure location.

Rule ID

SV-256868r991589_rule

STIG

IBM Hardware Management Console (HMC) Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000366

Discussion

The Hardware Management Console is used to perform Initial Program Load (IPLs) and control the Processor Resource/System Manager (PR/SM). If the Hardware Management Console is not located in a secure location, unauthorized personnel can bypass security, access the system, and alter the environment. This can lead to loss of secure operations if not corrected immediately.

Check Content

Verify the location of the Hardware Management Console.

It should be located in a controlled area.
Access to it should be restricted.

If the Hardware Management Console is not located in a secure location this is a FINDING.

Fix Text

Move the Hardware Management Console to a secure location and implement access controls for authorized personnel.