STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Soaring Software Solutions TCMax 9.x Security Technical Implementation Guide

V-281380

CAT II (Medium)

TCMax must enforce a role-based access control (RBAC) policy over defined subjects and objects.

Rule ID

SV-281380r1186164_rule

STIG

Soaring Software Solutions TCMax 9.x Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-002169CCI-000366

Discussion

RBAC enables users to control, at both broad and granular levels, what administrators and end users can do. RBAC also enables users to more closely align the roles assigned to users and administrators to the actual roles they hold within the organization.

Check Content

Role-Based Access Control hierarchy is to be defined by the authorizing authority (AO). Separation of duties must be configured.

1. Using an account of appropriate privileges to access TCMax, go to Settings >> User Options.

2. Evaluate the users using the combo box in the top right to change users.

3. Ensure users have the minimal permissions required to perform their duties.

4. Verify least two users have different role types such as "admin" and "user".

If only one assigned role exists, this is a finding.

If users have excessive permissions, this is a finding.

Fix Text

Role-Based Access Control hierarchy is to be defined by the AO. Separation of duties must be configured.

1. Using an account of appropriate privileges to access TCMax, go to Settings >> User Options.

2. Assign minimal permissions to each user required to perform their job.

3. Assign two or more roles (as defined by the AO) to at least two different user types.