STIGQter STIGQter: STIG Summary: IBM z/OS TSS Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

CA-TSS security data sets and/or databases must be properly protected.

DISA Rule

SV-223903r561402_rule

Vulnerability Number

V-223903

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

TSS0-ES-000300

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Review access authorization to critical security database files. Evaluate the impact of correcting the deficiency. Develop a plan of action and implement the changes required to protect the ESM files.

Configure READ and/or greater access to all ESM files and/or databases are limited to system programmers and/or security personnel, and/or batch jobs that perform ESM maintenance. READ access can be given to auditors and DASD batch. All accesses to ESM files and/or databases are logged.

Check Contents

Determine all associated ESM security data sets and/or databases.

If the following accesses to the ESM security data sets and/or databases are properly restricted as detailed below, this is not a finding.

The ESM data set rules for ESM security data sets and/or databases restrict READ access to auditors and DASD batch.

The ESM data set rules for ESM security data sets and/or databases restrict READ and/or greater access to z/OS systems programming personnel, security personnel, and/or batch jobs that perform ESM maintenance.

All (i.e., failures and successes) data set access authorities (i.e., READ, UPDATE, ALTER, and CONTROL) for ESM security data sets and/or databases are logged.

Vulnerability Number

V-223903

Documentable

False

Rule Version

TSS0-ES-000300

Severity Override Guidance

Determine all associated ESM security data sets and/or databases.

If the following accesses to the ESM security data sets and/or databases are properly restricted as detailed below, this is not a finding.

The ESM data set rules for ESM security data sets and/or databases restrict READ access to auditors and DASD batch.

The ESM data set rules for ESM security data sets and/or databases restrict READ and/or greater access to z/OS systems programming personnel, security personnel, and/or batch jobs that perform ESM maintenance.

All (i.e., failures and successes) data set access authorities (i.e., READ, UPDATE, ALTER, and CONTROL) for ESM security data sets and/or databases are logged.

Check Content Reference

M

Target Key

4102

Comments