STIGQter STIGQter: STIG Summary: IBM Hardware Management Console (HMC) STIG Version: 1 Release: 5 Benchmark Date: 20 Jan 2015:

The Hardware Management Console Event log must be active.

DISA Rule

SV-30015r2_rule

Vulnerability Number

V-24352

Group Title

HMC0070

Rule Version

HMC0070

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The System Administrator will activate the Hardware Management Console Event log and ensure that all tracking parameters are set.

This is done by selecting the View Console Events panel under Console Actions.
From this panel you can display:

Console Information on EC Changes
Console Service History displays HMC Problems
Console Tasks Displays Last 2000 tasks performed on console
View Licenses View LIC (Licensed Internal Code)
View Security Logs tracks an object’s operational state, status, or settings change or involves user access to tasks, actions, and objects.

Check Contents

Verify on the Hardware Management Console that the Event log is in use.

This is done by selecting the View Console Events panel under Console Actions.
From this panel you can display:

Console Information on EC Changes
Console Service History displays HMC Problems
Console Tasks Displays Last 2000 tasks performed on console
View Licenses View LIC (Licensed Internal Code)
View Security Logs tracks an object’s operational state, status, or settings change or involves user access to tasks, actions, and objects.

If no Event log exists, this is a FINDING.

If the Event log exists and is not collecting data, this is a FINDING.

Vulnerability Number

V-24352

Documentable

False

Rule Version

HMC0070

Severity Override Guidance

Verify on the Hardware Management Console that the Event log is in use.

This is done by selecting the View Console Events panel under Console Actions.
From this panel you can display:

Console Information on EC Changes
Console Service History displays HMC Problems
Console Tasks Displays Last 2000 tasks performed on console
View Licenses View LIC (Licensed Internal Code)
View Security Logs tracks an object’s operational state, status, or settings change or involves user access to tasks, actions, and objects.

If no Event log exists, this is a FINDING.

If the Event log exists and is not collecting data, this is a FINDING.

Check Content Reference

M

Responsibility

Systems Programmer

Target Key

1891

Comments