Check: ACP00350
zOS TSS STIG:
ACP00350
(in versions v6 r43 through v6 r30)
Title
IEASYMUP resource will be protected in accordance with proper security requirements. (Cat II impact)
Discussion
Failure to properly control access to the IEASYMUP resource could result in unauthorized personnel modifying sensitive z/OS symbolic. This exposure may threaten the integrity and availability of the operating system environment.
Check Content
Refer to the following report produced by the Data Set and Resource Data Collection: - SENSITVE.RPT(WHOHIBMF) Automated Analysis Refer to the following report produced by the Data Set and Resource Data Collection: - PDI(ACP00350) Verify that the accesses for IEASYMUP resources and/or generic equivalent are properly restricted. If the following guidance is true, this is not a finding. ___ The TSS resources are owned or DEFPROT is specified for the resource class. ___ The TSS resource access authorizations restrict UPDATE and/or greater access to DASD administrators, Tape Library personnel, and system programming personnel. ___ The TSS resource logging requirements are specified.
Fix Text
The IAO will ensure that the System level symbolic resources are defined to the FACILITY resource class and protected. UPDATE access to the System level symbolic resources are limited to System Programmers, DASD Administrators, and/or Tape Library personnel. All access is logged. Ensure the guidelines for the resources and/or generic equivalent are followed. Limit access to the IEASYMUP resources to above personnel with UPDATE and/or greater access. The following commands are provided as a sample for implementing resource controls: TSS ADD(ADMIN) IBMFAC(IEASYMUP) TSS PERMIT(<dasdaudt>) IBMFAC(IEASYMUP) ACC(U) ACTION(AUDIT) TSS PERMIT(<syspaudt>) IBMFAC(IEASYMUP) ACC(U) ACTION(AUDIT) TSS PERMIT(<tapeaudt>) IBMFAC(IEASYMUP) ACC(U) ACTION(AUDIT)
Additional Identifiers
Rule ID: SV-38888r5_rule
Vulnerability ID: V-29532
Group Title: ACP00350
Expert Comments
Controls
Number | Title |
---|---|
AC-6(9) |
Auditing Use of Privileged Functions |