STIGQter STIGQter: STIG Summary: IBM z/OS ACF2 Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

IBM z/OS System data sets used to support the VTAM network must be properly secured.

DISA Rule

SV-223644r533198_rule

Vulnerability Number

V-223644

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

ACF2-VT-000010

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Define ACF2 data set rules for all VTAM system data sets to restrict access to only network systems programming staff.
Auditors may have READ access as documented and approved by ISSM.

These data sets include libraries containing VTAM load modules and exit routines, and VTAM start options and definition statements.

Example:
$KEY(SYS1)
VTAM-.- UID(sysprgmr) R(A) W(L) A(L) E(A)

$KEY(S3V)
$PREFIX(SYS3)
VTAM-.- UID(sysprgmr) R(A) W(L) A(L) E(A)

Check Contents

Create a list of data set names containing all VTAM start options, configuration lists, network resource definitions, commands, procedures, exit routines, all SMP/E TLIBs, and all SMP/E DLIBs used for installation and in development/production VTAM environments.

If ACF2 data set rules for all VTAM system data sets do not restrict access to only network systems programming staff, this is a finding.
If ACF2 data set rules for all VTAM system data sets do not restrict auditors to READ access only, this is a finding.

These data sets include libraries containing VTAM load modules and exit routines, and VTAM start options and definition statements.

Vulnerability Number

V-223644

Documentable

False

Rule Version

ACF2-VT-000010

Severity Override Guidance

Create a list of data set names containing all VTAM start options, configuration lists, network resource definitions, commands, procedures, exit routines, all SMP/E TLIBs, and all SMP/E DLIBs used for installation and in development/production VTAM environments.

If ACF2 data set rules for all VTAM system data sets do not restrict access to only network systems programming staff, this is a finding.
If ACF2 data set rules for all VTAM system data sets do not restrict auditors to READ access only, this is a finding.

These data sets include libraries containing VTAM load modules and exit routines, and VTAM start options and definition statements.

Check Content Reference

M

Target Key

4100

Comments