The Hardware Management Console must be located in a secure location.

From IBM Hardware Management Console (HMC) STIG

Part of HMC0010

Associated with IA controls: PECF-1, PEPF-2, PEPF-1, PECF-2

Associated with: CCI-002916

SV-29999r2_rule The Hardware Management Console must be located in a secure location.

Vulnerability discussion

The Hardware Management Console is used to perform Initial Program Load (IPLs) and control the Processor Resource/System Manager (PR/SM). If the Hardware Management Console is not located in a secure location, unauthorized personnel can bypass security, access the system, and alter the environment. This can lead to loss of secure operations if not corrected immediately.

Check content

Verify the location of the Hardware Management Console. It should be located in a controlled area. Access to it should be restricted. If the Hardware Management Console is not located in a secure location this is a FINDING.

Fix text

Move the Hardware Management Console to a secure location and implement access controls for authorized personnel.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer