Check: ACF2-OS-002430
IBM z/OS ACF2 STIG:
ACF2-OS-002430
(in versions v9 r2 through v7 r1)
Title
IBM z/OS system administrator must develop a procedure to shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of any security functions are discovered. (Cat II impact)
Discussion
If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hardware, software, and/or firmware of the information system responsible for enforcing the system security policy and supporting the isolation of code and data on which the protection is based. Security functionality includes, but is not limited to, establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters. Notifications provided by information systems include messages to local computer consoles, and/or hardware indications, such as lights. This capability must take into account operational requirements for availability for selecting an appropriate response. The organization may choose to shut down or restart the information system upon security function anomaly detection.
Check Content
Ask the system administrator for the procedure to shut down the information system, restart the information system, and/or notify the system administrator when anomalies occur. If a procedure does not exist, this is a finding. If the procedure does not properly shut down the information system, restart the information system, and/or notify the system administrator when anomalies occur, this is a finding.
Fix Text
Develop a procedure to shut down the information system, restart the information system, and/or notify the system administrator when anomalies occur.
Additional Identifiers
Rule ID: SV-223582r958948_rule
Vulnerability ID: V-223582
Group Title: SRG-OS-000447-GPOS-00201
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002702 |
Shut the system down, restart the system, and/or initiate organization-defined alternative action(s) when anomalies in the operation of the organization-defined security functions are discovered. |
Controls
Number | Title |
---|---|
SI-6 |
Security Function Verification |