Checked | Name | Title |
---|
☐ | SV-7533r4_rule | CICS region logonid(s) must be defined and/or controlled in accordance with the security requirements. |
☐ | SV-7529r3_rule | Sensitive CICS transactions are not protected in accordance with security requirements. |
☐ | SV-7531r4_rule | CICS System Initialization Table (SIT) parameter values must be specified in accordance with proper security requirements. |
☐ | SV-7537r4_rule | CICS default logonid(s) must be defined and/or controlled in accordance with the security requirements. |
☐ | SV-7543r4_rule | CICS logonid(s) must be configured with proper timeout and signon limits. |
☐ | SV-7525r3_rule | CICS userids are not defined and/or controlled in accordance with proper security requirements. |
☐ | SV-7978r3_rule | CICS system data sets are not properly protected. |
☐ | SV-8032r4_rule | Control options for the Top Secret CICS facilities must meet minimum requirements. |
☐ | SV-43227r4_rule | IBM CICS Transaction Server SPI command resources must be properly defined and protected. |