STIGQter STIGQter: STIG Summary: IBM z/OS RACF Security Technical Implementation Guide Version: 8 Release: 3 Benchmark Date: 23 Apr 2021:

IBM RACF assignment of the RACF OPERATIONS attribute to individual userids must be fully justified.

DISA Rule

SV-223714r604139_rule

Vulnerability Number

V-223714

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

RACF-ES-000670

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Review all USERIDs with the OPERATIONS attribute. Ensure documentation providing justification for access is maintained and filed with the ISSO, and that unjustified access is removed.

A sample command to remove the OPERATIONS attribute from a userid is shown here:

ALU <userid> NOOPERATIONS

To remove the Group-Operations attribute:

CO <user> GROUP(<groupname>) NOOPERATIONS

Check Contents

From the ISPF Command Shell enter:
ListUser *

If authorization to the SYSTEM OPERATIONS attribute is restricted to key systems personnel such as individuals responsible for continuing operations, Storage Management, and emergency recovery, this is not a finding.

If any users connected to sensitive system dataset HLQ (e.g., SYS1, SYS2, ETC) groups with the Group-OPERATIONS are key systems personnel, such as individuals responsible for continuing operations, Storage Management, and emergency recovery, this is a finding.

Otherwise, Group-OPERATIONS is allowed.

Vulnerability Number

V-223714

Documentable

False

Rule Version

RACF-ES-000670

Severity Override Guidance

From the ISPF Command Shell enter:
ListUser *

If authorization to the SYSTEM OPERATIONS attribute is restricted to key systems personnel such as individuals responsible for continuing operations, Storage Management, and emergency recovery, this is not a finding.

If any users connected to sensitive system dataset HLQ (e.g., SYS1, SYS2, ETC) groups with the Group-OPERATIONS are key systems personnel, such as individuals responsible for continuing operations, Storage Management, and emergency recovery, this is a finding.

Otherwise, Group-OPERATIONS is allowed.

Check Content Reference

M

Target Key

4101

Comments