Sha256: fd0fc88c71ec4f0e23c59525608eb198b7fa47aad0e2a1f118307ec94b9aaa25
Contents?: true
Size: 960 Bytes
Versions: 2
Compression:
Stored size: 960 Bytes
Contents
{ "name": "stig_zos_ibm_cics_transaction_servertss", "date": "2018-01-05", "description": "None", "title": "z/OS IBM CICS Transaction Server for TSS STIG", "version": "None", "item_syntax": "^\\w-\\d+$", "section_separator": null, "items": [ { "id": "V-17982", "title": "IBM CICS Transaction Server SPI command resources must be properly defined and protected.", "description": "IBM CICS Transaction Server can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of the operating system environment, and compromise the confidentiality of customer data. Many utilities assign resource controls that can be granted to system programmers only in greater than read authority. Resources are also granted to certain non systems personnel with read only authority.", "severity": "medium" } ] }
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
kriterion-0.1.0 | standards/stig_zos_ibm_cics_transaction_servertss.json |
kriterion-0.0.1 | standards/stig_zos_ibm_cics_transaction_servertss.json |