STIGQter STIGQter: STIG Summary: IBM z/OS ACF2 Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

CA-ACF2 allocate access to system user catalogs must be properly protected.

DISA Rule

SV-223435r560937_rule

Vulnerability Number

V-223435

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

ACF2-ES-000140

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Review access authorization to critical system files. Evaluate the impact of correcting the deficiency. Develop a plan of action and implement the changes as required to protect USER CATALOGS.

Configure ESM rules for allocate access to USER CATALOGS, limited to system programmers only, and all allocate access is logged.

Configure ESM rules for the USER CATALOGS to allow any Products or procedures system programmer access for system-level maintenance that meets the following specific case:
- The batch job or procedure must be documented in the SITE Security Plan.
- Reside in a data set that is restricted to systems programmers’ access only.

Check Contents

From the ISPF Command Shell enter:
LISTCat USERCATALOG ALL NOPREFIX

Review the ESM data set rules for each usercatalog defined.

If the data set rules for User Catalogs do not restrict ALTER access to only z/OS systems programming personnel, this is a finding.

If Products or procedures requiring system programmer access for system level maintenance meet the following specific case:
- The batch job or procedure must be documented in the SITE Security Plan.
- Reside in a data set that is restricted to systems programmers’ access only.
If the above is true, this is not a finding.

If the data set rules for User Catalogs do not specify that all (i.e., failures and successes) ALTER access will be logged, this is a finding.

Vulnerability Number

V-223435

Documentable

False

Rule Version

ACF2-ES-000140

Severity Override Guidance

From the ISPF Command Shell enter:
LISTCat USERCATALOG ALL NOPREFIX

Review the ESM data set rules for each usercatalog defined.

If the data set rules for User Catalogs do not restrict ALTER access to only z/OS systems programming personnel, this is a finding.

If Products or procedures requiring system programmer access for system level maintenance meet the following specific case:
- The batch job or procedure must be documented in the SITE Security Plan.
- Reside in a data set that is restricted to systems programmers’ access only.
If the above is true, this is not a finding.

If the data set rules for User Catalogs do not specify that all (i.e., failures and successes) ALTER access will be logged, this is a finding.

Check Content Reference

M

Target Key

4100

Comments