STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to CA IDMS Security Technical Implementation Guide

V-251590

CAT II (Medium)

All installation-delivered IDMS User-level programs must be properly secured.

Rule ID

SV-251590r960792_rule

STIG

CA IDMS Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000213, CCI-001082

Discussion

If user-level programs are not secured, then unauthorized users may use them to access and manipulate various resources within the DBMS. Satisfies: SRG-APP-000033-DB-000084, SRG-APP-000211-DB-000122

Check Content

The following are user-level batch programs that are executed using JCL rather than by the CV. As batch programs, they need to be secured by the external security manager (ESM) rather than through the SRTT.

Validate the following suggested user-level programs are secured by the ESM:
ADSBATCH
ADSOBPLG
CULPRIT
IDMSBCF
OLQBATCH
OLQBNOTE

Contact the security office to confirm that the programs in this list are secured. If the programs listed are not secured, this is a finding.

Fix Text

Contact the security office to confirm that the programs in this list are secured via the ESM and assigned to the appropriate users. Each program listed must be secured.