STIGQter STIGQter: STIG Summary: Mainframe Product Security Requirements Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020:

The Mainframe Product must provide the capability for authorized users to capture, record, and log all content related to a user session.

DISA Rule

SV-82727r1_rule

Vulnerability Number

V-68237

Group Title

SRG-APP-000093-MFP-000138

Rule Version

SRG-APP-000093-MFP-000138

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Mainframe Product to permit authorized users to capture, record, and log all content related to a user session.

If an ESM is in use, configure the rules to restrict the ability to capture, record, and audit user sessions to system programmers and security administrators.

Check Contents

If the Mainframe Product has no function or capability for session operations, this is not applicable.

Examine installation and configuration settings.

If the Mainframe Product does not have the capability to capture, record, and audit user sessions, this is a finding.

If the Mainframe Product does not restrict the ability to capture, record, and audit user sessions to system programmers or security administrators, this is a finding.

If an external security manager (ESM) is in use, examine the configuration and rules to determine if the ability to capture, record, and audit user sessions is restricted to system programmers or security administrators.

If it is not, this is a finding.

Vulnerability Number

V-68237

Documentable

False

Rule Version

SRG-APP-000093-MFP-000138

Severity Override Guidance

If the Mainframe Product has no function or capability for session operations, this is not applicable.

Examine installation and configuration settings.

If the Mainframe Product does not have the capability to capture, record, and audit user sessions, this is a finding.

If the Mainframe Product does not restrict the ability to capture, record, and audit user sessions to system programmers or security administrators, this is a finding.

If an external security manager (ESM) is in use, examine the configuration and rules to determine if the ability to capture, record, and audit user sessions is restricted to system programmers or security administrators.

If it is not, this is a finding.

Check Content Reference

M

Target Key

3061

Comments