Check: ZISFT002
z/OS IBM System Display and Search Facility (SDSF) for TSS STIG:
ZISFT002
(in versions v6 r10 through v6 r8)
Title
IBM System Display and Search Facility (SDSF) HASPINDX data set identified in the INDEX parameter must be properly protected. (Cat II impact)
Discussion
IBM System Display and Search Facility (SDSF) HASPINDX data set control the execution, configuration, and security of the SDSF products. Failure to properly protect access to these data sets could result in unauthorized access. This exposure may threaten the availability of SDSF, and compromise the confidentiality of customer data.
Check Content
If the z/OS operating system is Release 2.2 or higher this is not applicable. Refer to the following report produced by the Data Set and Resource Data Collection: - SENSITVE.RPT(SDSFRPT) Automated Analysis Refer to the following report produced by the Data Set and Resource Data Collection: - PDI(ZISF0002) Verify that the accesses to the IBM System Display and Search Facility (SDSF) HASPINDX data set specified on the INDEX control statement in the ISFPARMS statements (identified in the SFSFPARM DD statement of the SDSF stc) are properly restricted. If the following guidance is true, this is not a finding. ___ The TSS data set rules for the data sets restricts READ access to the auditors. ___ The TSS data set rules for the data sets restricts UPDATE access to SDSF Started Tasks. ___ The TSS data set rules for the data sets restricts WRITE and/or greater access to systems programming personnel. Note: If running z/OS V1R11 or above, with the use of a new JES logical log, the HASPINDX, may not exist and may make this vulnerability not applicable (N/A). However if used the HASPINDX dataset must be restricted. Note: If running z/OS V1R11 systems or above and NOT using JES logical log, the HASPINDX data set must be protected.
Fix Text
Ensure that the HASPINDX dataset identified in the INDEX parameter value of ISFPARMS options statement is restricted as described below. The HASPINDX data set is used by SDSF when building the SYSLOG panel. This data set contains information related to all SYSLOG jobs and data sets on the spool. Since SDSF dynamically allocates this data set, explicit user access authorization to this data set should not be required. Due to the potentially sensitive data in this data set, access authorization will be restricted. READ access is restricted to the auditors. UPDATE access is restricted to SDSF Started Tasks. WRITE and/or greater access is restricted to systems programming personnel. Note: If running z/OS V1R11 or above, with the use of a new JES logical log, the HASPINDX, may not exist and may make this vulnerability not applicable (N/A). However if used the HASPINDX dataset must be restricted. Note: If running z/OS V1R11 systems or above and NOT using JES logical log, the HASPINDX data set must be protected. Data sets to be protected may be: SYS1.HASPINDX The following commands are provided as a sample for implementing data set controls: TSS ADD(SYS1) DSN(SYS1) TSS PERMIT(syspaudt) DSN(SYS1.HASPINDX) ACCESS(ALL) TSS PERMIT(sdsf stc) DSN(SYS1.HASPINDX) ACCESS(UPDATE) TSS PERMIT(audtaudt) DSN(SYS1.HASPINDX) ACCESS(READ)
Additional Identifiers
Rule ID: SV-225106r467160_rule
Vulnerability ID: V-225106
Group Title: SRG-OS-000080
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000213 |
The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies. |
Controls
Number | Title |
---|---|
AC-3 |
Access Enforcement |