Checked | Name | Title |
---|
☐ | SV-44r4_rule | CICS region logonid(s) must be defined and/or controlled in accordance with the security requirements. |
☐ | SV-251r3_rule | Sensitive CICS transactions are not protected in accordance with security requirements. |
☐ | SV-302r5_rule | CICS System Initialization Table (SIT) parameter values must be specified in accordance with proper security requirements. |
☐ | SV-7188r3_rule | CICS startup JCL statement is not specified in accordance with the proper security requirements. |
☐ | SV-7189r4_rule | Sensitive CICS transactions are not protected in accordance with the proper security requirements. |
☐ | SV-7191r3_rule | Sensitive CICS transactions are not protected in accordance with the proper security requirements. |
☐ | SV-7475r3_rule | ACF2/CICS parameter data sets are not protected in accordance with the proper security requirements. |
☐ | SV-7523r4_rule | CICS default logonid(s) must be defined and/or controlled in accordance with the security requirements. |
☐ | SV-7524r4_rule | CICS logonid(s) must be configured with proper timeout and signon limits. |
☐ | SV-7978r3_rule | CICS system data sets are not properly protected. |
☐ | SV-8031r4_rule | Key ACF2/CICS parameters must be properly coded. |
☐ | SV-43206r4_rule | IBM CICS Transaction Server SPI command resources must be properly defined and protected. |