STIGQter STIGQter: STIG Summary: IBM z/OS RACF Security Technical Implementation Guide Version: 8 Release: 3 Benchmark Date: 23 Apr 2021:

IBM RACF allocate access to system user catalogs must be properly protected.

DISA Rule

SV-223669r604139_rule

Vulnerability Number

V-223669

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

RACF-ES-000210

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Review access authorization to critical system files. Evaluate the impact of correcting the deficiency. Develop a plan of action and implement the changes as required to protect USER CATALOGS.

Configure ESM rules for allocate access to USER CATALOGS, limited to system programmers only, and all allocate access is logged.

Configure ESM rules for the USER CATALOGS to allow any products or procedures system programmer access for system-level maintenance that meets the following specific case:
- The batch job or procedure must be documented in the SITE Security Plan.
- Reside in a data set that is restricted to systems programmers’ access only.

Check Contents

From the ISPF Command Shell enter:
LISTCat USERCATALOG ALL NOPREFIX

Review the ESM data set rules for each usercatalog defined.

If the data set rules for User Catalogs do not restrict ALTER access to only z/OS systems programming personnel, this is a finding.

If Products or procedures requiring system programmer access for system-level maintenance meets the following specific case, this is not a finding:
- The batch job or procedure must be documented in the SITE Security Plan.
- Reside in a data set that is restricted to systems programmers’ access only.

If the data set rules for User Catalogs do not specify that all (i.e., failures and successes) ALTER access will be logged, this a finding.

Vulnerability Number

V-223669

Documentable

False

Rule Version

RACF-ES-000210

Severity Override Guidance

From the ISPF Command Shell enter:
LISTCat USERCATALOG ALL NOPREFIX

Review the ESM data set rules for each usercatalog defined.

If the data set rules for User Catalogs do not restrict ALTER access to only z/OS systems programming personnel, this is a finding.

If Products or procedures requiring system programmer access for system-level maintenance meets the following specific case, this is not a finding:
- The batch job or procedure must be documented in the SITE Security Plan.
- Reside in a data set that is restricted to systems programmers’ access only.

If the data set rules for User Catalogs do not specify that all (i.e., failures and successes) ALTER access will be logged, this a finding.

Check Content Reference

M

Target Key

4101

Comments