Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Resources
Documents
Publishers
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
z/OS BMC CONTROL-O for RACF Security Technical Implementation Guide
z/OS BMC CONTROL-O for RACF Security Technical Implementation Guide
An XCCDF Benchmark
Details
Profiles
Items
Prose
File Metadata
8 rules organized in 8 groups
SRG-OS-000018
1 Rule
BMC CONTROL-O configuration/parameter values are not specified properly.
Medium Severity
BMC CONTROL-O configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.
SRG-OS-000080
1 Rule
BMC CONTROL-O configuration/parameter values are not specified properly.
Medium Severity
BMC CONTROL-O configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.
SRG-OS-000018
1 Rule
BMC CONTROL-O security exits are not installed or configured properly.
Medium Severity
The BMC CONTROL-O security exits enable access authorization checking to BMC CONTROL-O commands, features, and online functionality. If these exit(s) is (are) not in place, activities by unauthorized users may result. BMC CONTROL-O security exit(s) interface with the ACP. If an unauthorized exit was introduced into the operating environment, system security could be weakened or bypassed. These exposures may result in the compromise of the operating system environment, ACP, and customer data.
SRG-OS-000080
1 Rule
BMC CONTROL-O installation data sets will be properly protected.
Medium Severity
BMC CONTROL-O installation data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in violating the integrity of the base product which could result in compromising the operating system or sensitive data.
SRG-OS-000259
1 Rule
BMC CONTROL-O STC data sets must be properly protected.
Medium Severity
BMC CONTROL-O STC data sets have the ability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to these data sets could result in violating the integrity of the base product which could result in compromising the operating system or sensitive data.
SRG-OS-000018
1 Rule
BMC CONTROL-O resources must be properly defined and protected.
Medium Severity
BMC CONTROL-O can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the compromise of the operating system environment, and compromise the confidentiality of customer data. Many utilities assign resource controls that can be granted to systems programmers only in greater than read authority. Resources are also granted to certain non systems personnel with read only authority.
SRG-OS-000104
1 Rule
BMC CONTROL-O Started Task name is not properly identified / defined to the system ACP.
Medium Severity
BMC CONTROL-O requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system ACP, It allows the ACP to control the access and authorized users that require these capabilities. Failure to properly control these capabilities, could compromise of the operating system environment, ACP, and customer data.
SRG-OS-000104
1 Rule
BMC CONTROL-O Started task(s) must be properly defined to the STARTED resource class for RACF.
Medium Severity
Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating system, ACP, and customer data.