STIGQter STIGQter: STIG Summary: z/OS ACF2 STIG Version: 6 Release: 43 Benchmark Date: 24 Jan 2020: BPX resource(s) is(are) not protected in accordance with security requirements.

DISA Rule

SV-7271r2_rule

Vulnerability Number

V-6968

Group Title

ZUSS0021

Rule Version

ZUSS0021

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The Systems Programmer and IAO will ensure that BPX. Resources are properly protected and access is restricted to appropriate system tasks or systems programming personnel.

Ensure the following items for the FACILITY resource class, TYPE(FAC):

1) The ACF2 rules for the BPX resource specify a default access of NONE.

Example:

$KEY(BPX) TYPE(FAC)
- UID(*) PREVENT

2) There are no ACF2 rules that allow access to the BPX resource.

Example:

$KEY(BPX) TYPE(FAC)
- UID(*) PREVENT

3) There is no ACF2 rule for BPX.SAFFASTPATH defined.

Example:

$KEY(BPX) TYPE(FAC)
SAFFASTPATH UID(*) PREVENT

4) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the zOS STIG Addendum, specify a default access of NONE.

Example:

$KEY(BPX) TYPE(FAC)
DAEMON UID(*) PREVENT
DEBUG UID(*) PREVENT
FILEATTR.APF UID(*) PREVENT
FILEATTR.PROGCTL UID(*) PREVENT
JOBNAME UID(*) PREVENT
SAFFASTPATH UID(*) PREVENT
SERVER UID(*) PREVENT
SMF UID(*) PREVENT
STOR.SWAP UID(*) PREVENT
SUPERUSER UID(*) PREVENT
WLMSERVER UID(*) PREVENT

5) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the zOS STIG Addendum, restrict access to appropriate system tasks or systems programming personnel as specified.

Example:

$KEY(BPX) TYPE(FAC)
DAEMON UID(*******STC******FTPD) SERVICE(READ) LOG
DAEMON UID(*******STC******INETD) SERVICE(READ) LOG
DAEMON UID(*******STC******NAMED) SERVICE(READ) LOG
DAEMON UID(*******STC******OMVSKERN) SERVICE(READ) LOG
DAEMON UID(*******STC******OMVS) SERVICE(READ) LOG
DAEMON UID(*******STC******OROUTED) SERVICE(READ) LOG
DAEMON UID(*******STC******OSNMPD) SERVICE(READ) LOG

Check Contents

a) Refer to the following report produced by the ACF2 Data Collection and Data Set and Resource Data Collection:

- SENSITVE.RPT(FACILITY)
- ACF2CMDS.RPT(RESOURCE) – Alternate report

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZUSS0021)

b) Review the following items for the FACILITY resource class, TYPE(FAC):

1) The ACF2 rules for the BPX resource specify a default access of NONE.
2) There are no ACF2 rules that allow access to the BPX resource.
3) There is no ACF2 rule for BPX.SAFFASTPATH defined.
4) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the z/OS STIG Addendum, specify a default access of NONE.
5) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the z/OS STIG Addendum, restrict access to appropriate system tasks or systems programming personnel.

c) If any item in (b) is untrue, this is a FINDING.

d) If all items in (b) are true, this is NOT A FINDING.

Vulnerability Number

V-6968

Documentable

False

Rule Version

ZUSS0021

Severity Override Guidance

a) Refer to the following report produced by the ACF2 Data Collection and Data Set and Resource Data Collection:

- SENSITVE.RPT(FACILITY)
- ACF2CMDS.RPT(RESOURCE) – Alternate report

Automated Analysis
Refer to the following report produced by the Data Set and Resource Data Collection:

- PDI(ZUSS0021)

b) Review the following items for the FACILITY resource class, TYPE(FAC):

1) The ACF2 rules for the BPX resource specify a default access of NONE.
2) There are no ACF2 rules that allow access to the BPX resource.
3) There is no ACF2 rule for BPX.SAFFASTPATH defined.
4) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the z/OS STIG Addendum, specify a default access of NONE.
5) The ACF2 rules for each of the BPX resources listed in the General Facility Class BPX Resources Table, in the z/OS STIG Addendum, restrict access to appropriate system tasks or systems programming personnel.

c) If any item in (b) is untrue, this is a FINDING.

d) If all items in (b) are true, this is NOT A FINDING.

Check Content Reference

M

Responsibility

Systems Programmer

Target Key

198

Comments