STIGQter STIGQter: STIG Summary: z/OS TADz for RACF STIG Version: 6 Release: 6 Benchmark Date: 22 Apr 2016:

Tivoli Asset Discovery for zOS (TADz) STC and/or batch data sets are not properly protected.

DISA Rule

SV-28548r2_rule

Vulnerability Number

V-17067

Group Title

ZB000001

Rule Version

ZTADR001

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Grant update and alter access to Tivoli Asset Discovery for z/OS (TADz) STC and/or batch data sets are limited to system programmers and TADz STC and/or batch jobs only.
Grant Read access to any scheduling products that are in use.

Grant Read access to auditors at the ISSO’s discretion.

Identify and document the product data sets and categorize them according to who will have update and alter access and if required that all update and allocate access is logged. Identify if any additional groups have update access for specific data sets, and assure that they are properly restricted to the ACP (Access Control Program) active on the system.


Data sets to be protected will be:
SYS3.TADZ

The following commands are provided as a sample for implementing dataset controls:

ad 'sys3.tadz.*.iq*.**' uacc(none) owner(daztech) -
audit(success(update) failures(read)) -
data('TADZ Output Data')
ad 'sys3.tadz.*.uiq.**' uacc(none) owner(daztech) -
audit(success(update) failures(read)) -
data('TADZ Output Data')
ad 'sys3.tadz.*.um.**' uacc(none) owner(daztech) -
audit(success(update) failures(read)) -
data('TADZ Output Data')

pe 'sys3.tadz.*.iq*.**' id(syspaudt) acc(a)
pe 'sys3.tadz.*.iq*.**' id(tadzmon) acc(a)
pe 'sys3.tadz.*.iq*.**' id(tadzinq) acc(a)
pe 'sys3.tadz.*.uiq.**' id(syspaudt) acc(a)
pe 'sys3.tadz.*.uiq.**' id(tadzmon) acc(a)
pe 'sys3.tadz.*.uiq.**' id(tadzinq) acc(a)
pe 'sys3.tadz.*.um.**' id(syspaudt) acc(a)
pe 'sys3.tadz.*.um.**' id(tadzmon) acc(a)
pe 'sys3.tadz.*.um.**' id(tadzinq) acc(a)

Check Contents

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(TADZSTC)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZTAD0001)

For all (TADz) STC and/or batch data sets:

If the UPDATE or greater access is restricted to systems programming personnel and the product STC(s) and/or batch job(s) this is not a finding.

If any job scheduling products are in use and access is restricted to READ this is not a finding.

If auditors have READ access this is not a finding.

Vulnerability Number

V-17067

Documentable

False

Rule Version

ZTADR001

Severity Override Guidance

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(TADZSTC)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZTAD0001)

For all (TADz) STC and/or batch data sets:

If the UPDATE or greater access is restricted to systems programming personnel and the product STC(s) and/or batch job(s) this is not a finding.

If any job scheduling products are in use and access is restricted to READ this is not a finding.

If auditors have READ access this is not a finding.

Check Content Reference

M

Responsibility

Systems Programmer

Target Key

1858

Comments