Check: RACF0248
zOS RACF STIG:
RACF0248
(in versions v6 r43 through v6 r30)
Title
MCS consoles are not active. (Cat II impact)
Discussion
(RACF0248: CAT II) MCS consoles can be used to issue operator commands. Failure to properly control access to MCS consoles could result in unauthorized personnel issuing sensitive operator commands. This exposure may threaten the integrity and availability of the operating system environment, and compromise the confidentiality of customer data.
Check Content
a) Refer to the following reports produced by the RACF Data Collection: - RACFCMDS.RPT(SETROPTS) - DSMON.RPT(RACCDT) - Alternate list of active resource classes Automated Analysis Refer to the following report produced by the RACF Data Collection: - PDI(RACF0248) b) If the CONSOLE resource class is active, there is NO FINDING. c) If the CONSOLE resource class is not active, this is a FINDING.
Fix Text
The IAO will ensure that CONSOLE resource class is active. Evaluate the impact associated with implementation of the control option. Develop a plan of action to implement the control option as specified in the example below: The RACF Command SETR LIST will show the status of RACF Controls including a list of ACTIVE classes. (1) The CONSOLE Class is activated with the command SETR CLASSACT(CONSOLE). (2) Generic profiles and commands should also be enabled with the command SETR GENERIC(CONSOLE) GENCMD(CONSOLE). (3) IBM recommends RACLISTing the CONSOLE Class which is accomplished with the command SETR RACL(CONSOLE). Refer to ACP00292, ACP00293, ACP00294 for information on content of the CONSOLE class.
Additional Identifiers
Rule ID: SV-7936r2_rule
Vulnerability ID: V-7491
Group Title: RACF0248
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000213 |
The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies. |
CCI-002233 |
The information system prevents organization-defined software from executing at higher privilege levels than users executing the software. |