Skip to content

IBM z/OS TSS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000066-GPOS-00034

    Group
  • SRG-OS-000066-GPOS-00034

    Group
  • SRG-OS-000104-GPOS-00051

    Group
  • SRG-OS-000080-GPOS-00048

    Group
  • CA-TSS Security control ACIDs must be limited to the administrative authorities authorized and that require these privileges to perform their job duties.

    The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A crucial part of any flow control solution is the ability to configure polic...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000001-GPOS-00001

    Group
  • SRG-OS-000021-GPOS-00005

    Group
  • SRG-OS-000021-GPOS-00005

    Group
  • The CA-TSS NPPTHRESH Control Option must be properly set.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • SRG-OS-000063-GPOS-00032

    Group
  • SRG-OS-000067-GPOS-00035

    Group
  • SRG-OS-000069-GPOS-00037

    Group
  • The CA-TSS NEWPHRASE and PPSCHAR Control Options must be properly set.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    Group
  • The CA-TSS NEWPW control options must be properly set.

    If the private key is stolen, this will lead to the compromise of the authentication and nonrepudiation gained through PKI because the attacker can use the private key to digitally sign documents a...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • IBM z/OS must use NIST FIPS-validated cryptography to protect passwords in the security database.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules