STIGQter STIGQter: STIG Summary: z/OS IBM System Display and Search Facility (SDSF) for TSS STIG Version: 6 Release: 8 Benchmark Date: 22 Apr 2016: IBM System Display and Search Facility (SDSF) installation data sets will be properly protected.

DISA Rule

SV-40698r1_rule

Vulnerability Number

V-16932

Group Title

ZB000000

Rule Version

ZISFT000

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The IAO will ensure that WRITE and/or greater access to IBM System Display and Search Facility (SDSF) installation data sets is limited to System Programmers only, and all WRITE and/or greater access is logged. READ access can be given to all authorized users.

The installing Systems Programmer will identify and document the product data sets and categorize them according to who will have WRITE and/or greater access and if required that all WRITE and/or greater access is logged. He will identify if any additional groups have WRITE and/or greater access for specific data sets, and once documented he will work with the IAO to see that they are properly restricted to the ACP (Access Control Program) active on the system.

Data sets to be protected will be:
SYS1.ISF.AISF
SYS1.ISF.SISF

The following commands are provided as a sample for implementing data set controls:

TSS ADD(SYS1) DSN(SYS1)
TSS PERMIT(syspaudt) DSN(SYS1.ISF.AISF) ACCESS(ALL) ACTION(AUDIT)
TSS PERMIT(syspaudt) DSN(SYS1.ISF.AISF) ACCESS(READ)
TSS PERMIT(syspaudt) DSN(SYS1.ISF.SISF) ACCESS(ALL) ACTION(AUDIT)
TSS PERMIT(syspaudt) DSN(SYS1.ISF.SISF) ACCESS(READ)
TSS PERMIT(authorized users/ALL) DSN(SYS1.ISF.SISF) ACCESS(READ)

Check Contents

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(ISFRPT)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZISF0000)

Verify that the accesses to the IBM System Display and Search Facility (SDSF) installation data sets are properly restricted. If the following guidance is true, this is not a finding.

___ The TSS data set rules for the data sets restricts READ access to all authorized users.

___ The TSS data set rules for the data sets restricts WRITE and/or greater access to systems programming personnel.

___ The TSS data set rules for the data sets specify that all (i.e., failures and successes) WRITE and/or greater access is logged.

Vulnerability Number

V-16932

Documentable

False

Rule Version

ZISFT000

Severity Override Guidance

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(ISFRPT)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZISF0000)

Verify that the accesses to the IBM System Display and Search Facility (SDSF) installation data sets are properly restricted. If the following guidance is true, this is not a finding.

___ The TSS data set rules for the data sets restricts READ access to all authorized users.

___ The TSS data set rules for the data sets restricts WRITE and/or greater access to systems programming personnel.

___ The TSS data set rules for the data sets specify that all (i.e., failures and successes) WRITE and/or greater access is logged.

Check Content Reference

M

Responsibility

Systems Programmer

Target Key

2190

Comments