STIGQter STIGQter: STIG Summary: z/OS IBM System Display and Search Facility (SDSF) for TSS STIG Version: 6 Release: 8 Benchmark Date: 22 Apr 2016: IBM System Display and Search Facility (SDSF) HASPINDX data set identified in the INDEX parameter must be properly protected.

DISA Rule

SV-40733r2_rule

Vulnerability Number

V-21592

Group Title

ZB000002

Rule Version

ZISFT002

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Ensure that the HASPINDX dataset identified in the INDEX parameter value of ISFPARMS options statement is restricted as described below.

The HASPINDX data set is used by SDSF when building the SYSLOG panel. This data set contains information related to all SYSLOG jobs and data sets on the spool. Since SDSF dynamically allocates this data set, explicit user access authorization to this data set should not be required. Due to the potentially sensitive data in this data set, access authorization will be restricted.

READ access is restricted to the auditors.

UPDATE access is restricted to SDSF Started Tasks.

WRITE and/or greater access is restricted to systems programming personnel.

Note: If running z/OS V1R11 or above, with the use of a new JES logical log, the HASPINDX, may not exist and may make this vulnerability not applicable (N/A). However if used the HASPINDX dataset must be restricted.

Note: If running z/OS V1R11 systems or above and NOT using JES logical log, the HASPINDX data set must be protected.

Data sets to be protected may be:
SYS1.HASPINDX

The following commands are provided as a sample for implementing data set controls:

TSS ADD(SYS1) DSN(SYS1)
TSS PERMIT(syspaudt) DSN(SYS1.HASPINDX) ACCESS(ALL)
TSS PERMIT(sdsf stc) DSN(SYS1.HASPINDX) ACCESS(UPDATE)
TSS PERMIT(audtaudt) DSN(SYS1.HASPINDX) ACCESS(READ)

Check Contents

If the z/OS operating system is Release 2.2 or higher this is not applicable.

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(SDSFRPT)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZISF0002)

Verify that the accesses to the IBM System Display and Search Facility (SDSF) HASPINDX data set specified on the INDEX control statement in the ISFPARMS statements (identified in the SFSFPARM DD statement of the SDSF stc) are properly restricted.

If the following guidance is true, this is not a finding.

___ The TSS data set rules for the data sets restricts READ access to the auditors.

___ The TSS data set rules for the data sets restricts UPDATE access to SDSF Started Tasks.

___ The TSS data set rules for the data sets restricts WRITE and/or greater access to systems programming personnel.

Note: If running z/OS V1R11 or above, with the use of a new JES logical log, the HASPINDX, may not exist and may make this vulnerability not applicable (N/A). However if used the HASPINDX dataset must be restricted.

Note: If running z/OS V1R11 systems or above and NOT using JES logical log, the HASPINDX data set must be protected.

Vulnerability Number

V-21592

Documentable

False

Rule Version

ZISFT002

Severity Override Guidance

If the z/OS operating system is Release 2.2 or higher this is not applicable.

Refer to the following report produced by the Data Set and Resource Data Collection:

- SENSITVE.RPT(SDSFRPT)

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZISF0002)

Verify that the accesses to the IBM System Display and Search Facility (SDSF) HASPINDX data set specified on the INDEX control statement in the ISFPARMS statements (identified in the SFSFPARM DD statement of the SDSF stc) are properly restricted.

If the following guidance is true, this is not a finding.

___ The TSS data set rules for the data sets restricts READ access to the auditors.

___ The TSS data set rules for the data sets restricts UPDATE access to SDSF Started Tasks.

___ The TSS data set rules for the data sets restricts WRITE and/or greater access to systems programming personnel.

Note: If running z/OS V1R11 or above, with the use of a new JES logical log, the HASPINDX, may not exist and may make this vulnerability not applicable (N/A). However if used the HASPINDX dataset must be restricted.

Note: If running z/OS V1R11 systems or above and NOT using JES logical log, the HASPINDX data set must be protected.

Check Content Reference

M

Responsibility

Systems Programmer

Target Key

2190

Comments