STIGQter STIGQter: STIG Summary: IBM z/OS ACF2 Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

Access to IBM z/OS special privilege TAPE-LBL or TAPE-BLP must be limited and/or justified.

DISA Rule

SV-223437r533198_rule

Vulnerability Number

V-223437

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

ACF2-ES-000160

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The ISSO will ensure Logonids with the TAPE-LBL or TAPE-BLP are kept to a minimum and are controlled and documented.

Review all LOGONIDs with these attributes.

Tape label bypass (BLP) privileges will be restricted at the user level. Specify one of the following two logonid privileges to grant a user access to BLP processing:

User LID Record:
TAPE-LBL
TAPE-BLP

It is possible to grant selected programs to bypass tape label processing regardless of the BLP related privilege of the logonid executing the program. This capability will not be used due to the requirement that accounting of BLP processing be done at the user level. Do not utilize the GSO BLPPGM record.

Check Contents

From the ISPF Command Shell enter:
ACF
SET LID
SET VERBOSE
LIST IF(TAPE-LBL OR TAPE-BLP)

If the number of users granted the special privileges TAPE-LBL or TAPE-BLP is strictly controlled and limited to systems programmer and operations personnel, this is not a finding.

If the number of users granted the special privileges TAPE-LBL or TAPE-BLP is not strictly controlled and limited to systems programmer and operations personnel, this is a finding.

Vulnerability Number

V-223437

Documentable

False

Rule Version

ACF2-ES-000160

Severity Override Guidance

From the ISPF Command Shell enter:
ACF
SET LID
SET VERBOSE
LIST IF(TAPE-LBL OR TAPE-BLP)

If the number of users granted the special privileges TAPE-LBL or TAPE-BLP is strictly controlled and limited to systems programmer and operations personnel, this is not a finding.

If the number of users granted the special privileges TAPE-LBL or TAPE-BLP is not strictly controlled and limited to systems programmer and operations personnel, this is a finding.

Check Content Reference

M

Target Key

4100

Comments