STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to CA IDMS Security Technical Implementation Guide

V-251592

CAT II (Medium)

All installation-delivered IDMS Database-Administrator-level programs must be properly secured.

Rule ID

SV-251592r960792_rule

STIG

CA IDMS Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-000213, CCI-001082

Discussion

DBA-level programs that are not secured may allow unauthorized users to use them to access and manipulate various resources within the DBMS. Satisfies: SRG-APP-000033-DB-000084, SRG-APP-000211-DB-000122

Check Content

The following are DBA-level batch programs and are executed using JCL rather than the CV. As batch programs, they need to be secured for DBAs in the external security manager (ESM) (included in DCADMIN, DBADMIN level security) rather than through the SRTT.

Validate the following suggested DBA-level programs are secured by the ESM.
ADSOBSYS
ADSOBTAT
IDMSCHEM
IDMSDBN1
IDMSDBN2
IDMSDDDL
IDMSPASS
IDMSRSTC
IDMSUBSC
RHDCOMVS

Contact the security office to confirm that the programs in this list are secured. If not, this is a finding.

Fix Text

Contact the security office to confirm that the programs in this list are secured via the ESM and assigned to the appropriate users. Each program in the list must be secured.