Check: ZIOAT030
z/OS BMC IOA for TSS STIG:
ZIOAT030
(in versions v6 r8 through v6 r6)
Title
BMC IOA Started Task name must be properly identified and defined to the system ACP. (Cat II impact)
Discussion
BMC IOA requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system ACP, It allows the ACP to control the access and authorized users that require these capabilities. Failure to properly control these capabilities, could compromise of the operating system environment, ACP, and customer data.
Check Content
Refer to the following report produced by the TSS Data Collection: - TSSCMDS.RPT(@ACIDS) Verify that the ACID(s) for the BMC IOA started task(s) is (are) properly defined. If the following attributes are defined, this is not a finding. FACILITY(STC, BATCH) PASSWORD(xxxxxxxx,0) MASTFAC(IOA) SOURCE(INTRDR) NOSUSPEND
Fix Text
The IAO working with the systems programmer will ensure the BMC IOA Started Task(s) is (are) properly identified and/or defined to the System ACP. If the product requires a Started Task, verify that it is properly defined to the System ACP with the proper attributes. Most installation manuals will indicate how the Started Task is identified and any additional attributes that must be specified. The following commands are provided as a sample for defining Started Task(s): TSS CREATE(IOAGATE) TYPE(USER) - NAME('*STC* for IOA') DEPT(xxxx) - FAC(STC,BATCH) - MASTFAC(IOA) PASS(xxxxxxxx,0) - SOURCE(INTRDR) NOSUSPEND
Additional Identifiers
Rule ID: SV-224603r518949_rule
Vulnerability ID: V-224603
Group Title: SRG-OS-000104
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000764 |
The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). |
Controls
Number | Title |
---|---|
IA-2 |
Identification And Authentication (Organizational Users) |