STIGQter STIGQter: STIG Summary: z/OS ACF2 STIG Version: 6 Release: 43 Benchmark Date: 24 Jan 2020: Users that have access to the CONSOLE resource in the TSOAUTH resource class are not properly defined.

DISA Rule

SV-7930r2_rule

Vulnerability Number

V-7488

Group Title

ACP00294

Rule Version

ACP00294

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

The IAO will ensure that all users that have access to the CONSOLE resource in the TSOAUTH resource class are properly defined.

Ensure the CONSOLE resource is not defined to the TSOAUTH resource class.

Example:

$KEY(CONSOLE) TYPE(TSO)
- UID(*) PREVENT

At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class or users assigned the CONSOLE attribute:

Logonids are restricted to the INFO level on the AUTH field specified in the OPERPARM segment of the user profile record.

Logonids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class (i.e., resource rules for TYPE(OPR)).

Example:

$KEY(MVS) TYPE(OPR)
MCSOPER.logonid UID(syspaudt) SERVICE(READ) ALLOW

COMPILE ' ACF2.MVA.OPR(MVS)' STORE

F ACF2,REBUILD(OPR)

Check Contents

a) Refer to the following reports produced by the ACF2 Data Collection and Data Set and Resource Data Collection:

- SENSITVE.RPT(TSOAUTH)
- ACF2CMDS.RPT(ATTCONSL)
- ACF2CMDS.RPT(OPERPARM)
- SENSITVE.RPT(OPERCMDS)
- ACF2CMDS.RPT(RESOURCE) – Alternate report

NOTE: If CLASMAP defines TSOAUTH or OPERCMDS as anything other than the default of TYPE(TSO) or TYPE(OPR), replace TSO or OPR below with the appropriate three letters.

b) If the CONSOLE resource is not defined to the TSOAUTH resource class, there is NO FINDING.

c) At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class or users assigned the CONSOLE attribute:

1) Logonids are restricted to the INFO level on the AUTH field specified in the OPERPARM segment of the user profile record.
2) Logonids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class (i.e., resource rules for TYPE(OPR)).

d) If all of the above are true, there is NO FINDING.

e) If any of the above are untrue, this is a FINDING.

Vulnerability Number

V-7488

Documentable

False

Rule Version

ACP00294

Severity Override Guidance

a) Refer to the following reports produced by the ACF2 Data Collection and Data Set and Resource Data Collection:

- SENSITVE.RPT(TSOAUTH)
- ACF2CMDS.RPT(ATTCONSL)
- ACF2CMDS.RPT(OPERPARM)
- SENSITVE.RPT(OPERCMDS)
- ACF2CMDS.RPT(RESOURCE) – Alternate report

NOTE: If CLASMAP defines TSOAUTH or OPERCMDS as anything other than the default of TYPE(TSO) or TYPE(OPR), replace TSO or OPR below with the appropriate three letters.

b) If the CONSOLE resource is not defined to the TSOAUTH resource class, there is NO FINDING.

c) At the discretion of the IAO, users may be allowed to issue z/OS system commands from a TSO session. With this in mind, ensure the following items are in effect for users granted the CONSOLE resource in the TSOAUTH resource class or users assigned the CONSOLE attribute:

1) Logonids are restricted to the INFO level on the AUTH field specified in the OPERPARM segment of the user profile record.
2) Logonids are restricted to READ access to the MVS.MCSOPER.userid resource defined in the OPERCMDS resource class (i.e., resource rules for TYPE(OPR)).

d) If all of the above are true, there is NO FINDING.

e) If any of the above are untrue, this is a FINDING.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

198

Comments