STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM zVM Using CA VM:Secure Security Technical Implementation Guide

V-237965

CAT II (Medium)

The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software.

Rule ID

SV-237965r649735_rule

STIG

IBM zVM Using CA VM:Secure Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local policies restrictions and/or rules. Failure to properly configure and maintain system software and applications on the information system could result in a weakened security posture.

Check Content

Ask the system administrator (SA) for documented procedures and routines for proper configuration management of software.

If there are no procedures or the procedures are not documented and on file with the ISSO, this is a finding.

Fix Text

Develop a procedure for proper configuration of software components.

Include proper maintenance procedures.