Skip to content

IBM z/OS ACF2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • CA-ACF2 must limit access to SYSTEM DUMP data sets to appropriate authorized users.

    Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, an...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 allocate access to system user catalogs must be properly protected.

    Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, an...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-ACF2 must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS must protect dynamic lists in accordance with proper security requirements.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules