Skip to content

z/OS IBM CICS Transaction Server for ACF2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Sensitive CICS transactions are not protected in accordance with the proper security requirements.

    Sensitive CICS transactions offer the ability to circumvent transaction level controls for accessing resources under CICS. These transactions must be protected so that only authorized users can ac...
    Rule Medium Severity
  • CICS System Initialization Table (SIT) parameter values must be specified in accordance with proper security requirements.

    The CICS SIT is used to define system operation and configuration parameters of a CICS system. Several of these parameters control the security within a CICS region. Failure to code the appropriate...
    Rule Medium Severity
  • IBM CICS Transaction Server SPI command resources must be properly defined and protected.

    IBM CICS Transaction Server can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the com...
    Rule Medium Severity
  • CICS startup JCL statement is not specified in accordance with the proper security requirements.

    The CICS SIT is used to define system operation and configuration parameters of a CICS system. Several of these parameters control the security within a CICS region. Failure to code the appropria...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules