Skip to content

IBM z/OS RACF Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • IBM z/OS libraries included in the system REXXLIB concatenation must be properly protected.

    Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, an...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF must limit Write or greater access to libraries containing EXIT modules to system programmers only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF must limit access to SYSTEM DUMP data sets to system programmers only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF must limit WRITE or greater access to all APF-authorized libraries to system programmers only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • The IBM RACF System REXX IRRPWREX security data set must be properly protected.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF security data sets and/or databases must be properly protected.

    The External Security Manager (ESM) database files contain all access control information for the operating system environment and system resources. Unauthorized access could result in the compromi...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF must limit all system PROCLIB data sets to system programmers only.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM RACF must limit access to System page data sets (i.e., PLPA, COMMON, and LOCALx) to system programmers.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • IBM z/OS MCS consoles access authorization(s) for CONSOLE resource(s) must be properly protected.

    MCS consoles can be used to issue operator commands. Failure to properly control access to MCS consoles could result in unauthorized personnel issuing sensitive operator commands. This exposure may...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000324-GPOS-00125

    Group
  • The IBM z/OS IEASYMUP resource must be protected in accordance with proper security requirements.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges.
    Rule Medium Severity
  • SRG-OS-000326-GPOS-00126

    Group
  • The IBM RACF JES(BATCHALLRACF) SETROPTS value must be set to JES(BATCHALLRACF).

    In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level...
    Rule Medium Severity
  • SRG-OS-000326-GPOS-00126

    Group
  • The IBM z/OS JES(XBMALLRACF) SETROPTS value must be set to JES(XBMALLRACF).

    In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level...
    Rule Medium Severity
  • SRG-OS-000327-GPOS-00127

    Group
  • IBM RACF OPERAUDIT SETROPTS value must set to OPERAUDIT.

    Misuse of privileged functions, either intentionally or unintentionally by authorized users, or by unauthorized external entities that have compromised information system accounts, is a serious and...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • SRG-OS-000063-GPOS-00032

    Group
  • SRG-OS-000468-GPOS-00212

    Group
  • The IBM RACF SETROPTS SAUDIT value must be specified.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000255-GPOS-00096

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • IBM z/OS must limit access for SMF collection files (i.e., SYS1.MANx) to appropriate users and/or batch jobs that perform SMF dump processing.

    SMF data collection is the system activity journaling facility of the z/OS system. Unauthorized access could result in the compromise of logging and recording of the operating system environment, E...
    Rule Medium Severity
  • SRG-OS-000364-GPOS-00151

    Group
  • SRG-OS-000480-GPOS-00229

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM RACF GRPLIST SETROPTS value must be set to ACTIVE.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM RACF TAPEDSN SETROPTS value specified must be properly set.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM RACF use of the AUDITOR privilege must be justified.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules