STIGQter STIGQter: STIG Summary: IBM z/OS ACF2 Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

IBM z/OS system administrators must develop an automated process to collect and retain SMF data.

DISA Rule

SV-223548r533198_rule

Vulnerability Number

V-223548

Group Title

SRG-OS-000342-GPOS-00133

Rule Version

ACF2-OS-000120

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The ISSO will ensure that an automated process is in place to collect SMF data.

Review SMF data collection and retention processes. Verify processes are automatically started to dump SMF collection files immediately upon their becoming full.

To ensure that all SMF data is collected in a timely manner, and to reduce the risk of data loss, the site will ensure that automated mechanisms are in place to collect and retain all SMF data produced on the system. Dump the SMF files (MANx) in systems based on the following guidelines:

Dump each SMF file as it fills up during the normal course of daily processing.

- Dump all remaining SMF data at the end of each processing day, or
- Establish a process using Audit logging.

Check Contents

Ask the system administrator if there is an automated process is in place to collect and retain all SMF data produced on the system.

If, based on the information provided, it can be determined that an automated process is in place to collect and retain all SMF data produced on the system, this is not a finding.

If it cannot be determined this process exists and is being adhered to, this is a finding.

Vulnerability Number

V-223548

Documentable

False

Rule Version

ACF2-OS-000120

Severity Override Guidance

Ask the system administrator if there is an automated process is in place to collect and retain all SMF data produced on the system.

If, based on the information provided, it can be determined that an automated process is in place to collect and retain all SMF data produced on the system, this is not a finding.

If it cannot be determined this process exists and is being adhered to, this is a finding.

Check Content Reference

M

Target Key

4100

Comments