STIGQter STIGQter: STIG Summary: zOS Websphere Application Server for ACF2 STIG Version: 6 Release: 1 Benchmark Date: 11 Mar 2020:

The CBIND Resource(s) for the WebSphere Application Server is(are) not protected in accordance with security requirements.

DISA Rule

SV-3899r3_rule

Vulnerability Number

V-3899

Group Title

ZWAS0030

Rule Version

ZWAS0030

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The IAO will ensure that the CBIND resource is defined to the ACP with an access of none.

Ensure the following items are in effect for CBIND resource protection:

The CLASMAP record defines the CBIND resource class.

The CBIND class defaults to a generic type code of SAF. It is recommended that a GSO CLASMAP record be added to change this to a site selected resource unique to the CBIND class such as CBI. The following shows how the suggested change example would be coded:

SET CONTROL(GSO)
INSERT CLASMAP.cbind RESOURCE(CBIND) RSRCTYPE(cbi) -ENTITYLN(41)

The CB.BIND.server_name resource is defined to the CBIND resource class with a default access of PREVENT.

Access to the CB.BIND.server_name resource is restricted to WAS server (STC) logonids and systems management logonids (e.g., WebSphere administrator ID).

Example:

$KEY(CB) TYPE(CBI)
BBOASR1 UID(was_admin_uid) SERVICE(READ) ALLOW
BIND.BBOASR1 UID(was_admin_uid) SERVICE(READ) ALLOW
UID(*) PREVENT

Check Contents

a) Refer to the following reports produced by the ACF2 Data Collection:

- ACF2CMDS.RPT(ACFGSO)
- SENSITVE.RPT(CBIND)

b) Ensure the following items are in effect for CBIND resource protection:

2) The CLASMAP record defines the CBIND resource class.

3) The CB.BIND.server_name resource is defined to the CBIND resource class with a default access of PREVENT.

4) Access to the CB.BIND.server_name resource is restricted to WAS server (STC) logonids and systems management logonids (e.g., WebSphere administrator ID).

c) If all items in (b) are true, there is NO FINDING.

e) If any item in (b) is untrue, this is a FINDING.

Vulnerability Number

V-3899

Documentable

False

Rule Version

ZWAS0030

Severity Override Guidance

a) Refer to the following reports produced by the ACF2 Data Collection:

- ACF2CMDS.RPT(ACFGSO)
- SENSITVE.RPT(CBIND)

b) Ensure the following items are in effect for CBIND resource protection:

2) The CLASMAP record defines the CBIND resource class.

3) The CB.BIND.server_name resource is defined to the CBIND resource class with a default access of PREVENT.

4) Access to the CB.BIND.server_name resource is restricted to WAS server (STC) logonids and systems management logonids (e.g., WebSphere administrator ID).

c) If all items in (b) are true, there is NO FINDING.

e) If any item in (b) is untrue, this is a FINDING.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

3361

Comments