Skip to content

Mainframe Product Security Requirements Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Mainframe Product must enforce approved authorizations for security administrator access to sensitive information and system resources in accordance with applicable access control policies.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...
    Rule Medium Severity
  • SRG-APP-000033

    Group
  • The Mainframe Product must enforce approved authorizations for system programmer access to sensitive information and system resources in accordance with applicable access control policies.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., networks, web servers, and web porta...
    Rule Medium Severity
  • SRG-APP-000038

    Group
  • SRG-APP-000065

    Group
  • The Mainframe Product must enforce the limit of three consecutive invalid logon attempts by a user during a 15 minute time period.

    By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the a...
    Rule Medium Severity
  • SRG-APP-000073

    Group
  • Mainframe Products scanning for malicious code must scan all media used for system maintenance prior to use.

    There are security-related issues arising from software brought into the information system specifically for diagnostic and repair actions (e.g., a software packet sniffer installed on a system in ...
    Rule Medium Severity
  • SRG-APP-000080

    Group
  • The Mainframe Product must protect against an individual (or process acting on behalf of an individual) falsely denying having performed actions defined in the site security plan to be covered by non-repudiation.

    Without non-repudiation, it is impossible to positively attribute an action to an individual (or process acting on behalf of an individual). Non-repudiation services can be used to determine if in...
    Rule Medium Severity
  • SRG-APP-000086

    Group
  • SRG-APP-000089

    Group
  • SRG-APP-000090

    Group
  • The Mainframe Product must allow only the information system security manager (ISSM) or individuals or roles appointed by the ISSM to select which auditable events are to be audited.

    Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...
    Rule Medium Severity
  • SRG-APP-000091

    Group
  • SRG-APP-000092

    Group
  • The Mainframe Product must initiate session auditing upon startup.

    If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enab...
    Rule Medium Severity
  • SRG-APP-000095

    Group
  • SRG-APP-000096

    Group
  • The Mainframe Product must produce audit records containing information to establish when (date and time) the events occurred.

    Without establishing when events occurred, it is impossible to establish, correlate, and investigate the events relating to an incident. In order to compile an accurate risk assessment, and provid...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules