Cleanup

 View Only

STIG Articles for CA Cleanup for ACF2, Top Secret, and IBM RACF

  • 1.  STIG Articles for CA Cleanup for ACF2, Top Secret, and IBM RACF

    Broadcom Employee
    Posted Feb 23, 2021 01:38 PM
    Edited by Scott Bohnert Feb 25, 2021 02:37 PM

    Security Technical Implementation Guide (STIG) articles explain how to secure your products, environment, and users. STIG articles enhance the confidentiality, integrity, and availability of data and infrastructure for customers using our Mainframe security products. For example, a STIG article can highlight key password phrase fields and values to implement for stronger access controls.

    When applied to your Mainframe security product, the security standards decrease the risk of unauthorized disclosure of sensitive information. We provide these security standards as guidelines. Before you implement these standards within your production environment, especially with large user populations, we recommend that you evaluate the specified standards in a local, representative test environment. 

    Use the following links to access CA Cleanup STIG articles:

    ·       CA Cleanup for ACF2
    ·
           CA Cleanup for Top Secret
    ·       CA Cleanup for RACF

    Share Your Feedback

    We encourage all customers to take advantage of this new offering, and we welcome your feedback. You can leave a comment at the bottom of each STIG article or contact Product Owner, John Pinkowski, at john.pinkowski@broadcom.com. We look forward to hearing from you!



    ------------------------------
    Scott Bohnert
    Staff Technical Writer
    Broadcom
    ------------------------------