SV-93695r1_rule
V-78989
SRG-OS-000480-GPOS-00227
IBMZ-VM-002410
CAT II
10
Develop a procedure that validates all security functions.
Develop a log depicting date and time of validation signed by action official.
Ask the system administrator (SA) if there is a documented procedure for validation of security functions on file with the ISSM/ISSO.
If there is none, this is a finding.
Ask for evidence that the procedures are performed.
If there is no evidentiary proof, this is a finding.
V-78989
False
IBMZ-VM-002410
Ask the system administrator (SA) if there is a documented procedure for validation of security functions on file with the ISSM/ISSO.
If there is none, this is a finding.
Ask for evidence that the procedures are performed.
If there is no evidentiary proof, this is a finding.
M
3211