STIGQter STIGQter: STIG Summary: IBM z/OS TSS Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

CA-TSS must limit Write or greater access to SYS1.NUCLEUS to system programmers only.

DISA Rule

SV-223900r561402_rule

Vulnerability Number

V-223900

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

TSS0-ES-000270

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Review access authorization to critical system files. Evaluate the impact of correcting the deficiency. Develop a plan of action and implement the changes required to protect SYS1.NUCLEUS.

Configure the WRITE or greater access to SYS1.NUCLEUS to be limited to system programmers only and all WRITE or greater access is logged.

Check Contents

Execute a dataset list of access for SYS1.NUCLEUS.

If all of the following are untrue, there is not a finding.

If any of the following is true, this is a finding.

The ACP data set rules for SYS1.NUCLEUS do not restrict WRITE or greater access to only z/OS systems programming personnel.
The ACP data set rules for SYS1.NUCLEUS do not specify that all (i.e., failures and successes) WRITE or greater access will be logged.

Vulnerability Number

V-223900

Documentable

False

Rule Version

TSS0-ES-000270

Severity Override Guidance

Execute a dataset list of access for SYS1.NUCLEUS.

If all of the following are untrue, there is not a finding.

If any of the following is true, this is a finding.

The ACP data set rules for SYS1.NUCLEUS do not restrict WRITE or greater access to only z/OS systems programming personnel.
The ACP data set rules for SYS1.NUCLEUS do not specify that all (i.e., failures and successes) WRITE or greater access will be logged.

Check Content Reference

M

Target Key

4102

Comments