STIGQter STIGQter: STIG Summary: IBM z/OS TSS Security Technical Implementation Guide Version: 8 Release: 2 Benchmark Date: 23 Apr 2021:

IBM z/OS UNIX SUPERUSER resources must be protected in accordance with guidelines.

DISA Rule

SV-224078r561402_rule

Vulnerability Number

V-224078

Group Title

SRG-OS-000080-GPOS-00048

Rule Version

TSS0-US-000050

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Ensure that all SUPERUSER resources for the UNIXPRIV resource class are restricted to appropriate system tasks and/or system programming personnel.

Review the following items for the UNIXPRIV resource class:

-The TSS owner defined for the SUPERUSER resource.
-There are no TSS rules that allow access to the SUPERUSER resource.
-There is no TSS rule for CHOWN.UNRESTRICTED defined.
-The TSS rules for each of the SUPERUSER resources listed in the z/OS UNIX System Services Planning, Establishing UNIX security, restrict access to appropriate system tasks or systems programming personnel.

Check Contents

From the ISPF Command Shell enter:
TSS WHOOWNS UNIXPRIV(*)

If the TSS resources and/or generic equivalent for SUPERUSER. is not owned enter:
TSS LIST RDT

If the TSS resources and/or generic equivalent for SUPERUSER. is not owned or DEFPROT is specified for the resource class, this is a finding.

From the ISPF Command Shell enter:
TSS WHOHAS SURROGAT(SUPERUSER.)

If the TSS resource access authorizations restrict BPX.SRV.user to system software processes (e.g., web servers) that act as servers under z/OS UNIX, this is not a finding.

Vulnerability Number

V-224078

Documentable

False

Rule Version

TSS0-US-000050

Severity Override Guidance

From the ISPF Command Shell enter:
TSS WHOOWNS UNIXPRIV(*)

If the TSS resources and/or generic equivalent for SUPERUSER. is not owned enter:
TSS LIST RDT

If the TSS resources and/or generic equivalent for SUPERUSER. is not owned or DEFPROT is specified for the resource class, this is a finding.

From the ISPF Command Shell enter:
TSS WHOHAS SURROGAT(SUPERUSER.)

If the TSS resource access authorizations restrict BPX.SRV.user to system software processes (e.g., web servers) that act as servers under z/OS UNIX, this is not a finding.

Check Content Reference

M

Target Key

4102

Comments