Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Resources
Documents
Publishers
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
z/OS CL/SuperSession for RACF Security Technical Implementation Guide
z/OS CL/SuperSession for RACF Security Technical Implementation Guide
An XCCDF Benchmark
Details
Profiles
Items
Prose
File Metadata
9 rules organized in 9 groups
SRG-OS-000018
1 Rule
CL/SuperSession profile options are set improperly.
Medium Severity
Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.
SRG-OS-000018
1 Rule
CL/SuperSession must be properly configured to generate SMF records for audit trail and accounting reports.
Medium Severity
Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications and compromise the confidentiality of customer data.
SRG-OS-000080
1 Rule
CL/SuperSession Install data sets must be properly protected.
Medium Severity
CL/SuperSession Install data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could result in violating the integrity of the base product which could result in compromising the operating system or sensitive data.
SRG-OS-000259
1 Rule
CL/SuperSession STC data sets must be properly protected.
Medium Severity
CL/SuperSession STC data sets provide the capability to use privileged functions and/or have access to sensitive data. Failure to properly restrict access to their data sets could result in violating the integrity of the base product which could result in compromising the operating system or sensitive data.
SRG-OS-000104
1 Rule
CL/SuperSession Started Task name is not properly identified / defined to the system ACP.
Medium Severity
CL/SuperSession requires a started task that will be restricted to certain resources, datasets and other system functions. By defining the started task as a userid to the system ACP, It allows the ACP to control the access and authorized users that require these capabilities. Failure to properly control these capabilities, could compromise of the operating system environment, ACP, and customer data.
SRG-OS-000104
1 Rule
CL/SuperSession Started task(s) must be properly defined to the STARTED resource class for RACF.
Medium Severity
Access to product resources should be restricted to only those individuals responsible for the application connectivity and who have a requirement to access these resources. Improper control of product resources could potentially compromise the operating system, ACP, and customer data.
SRG-OS-000309
1 Rule
CL/SuperSessions Resouce Class must be defined or active in the ACP.
Medium Severity
Failure to use a robust ACP to control a product could compromise the integrity and availability of the MVS operating system and user data.
SRG-OS-000018
1 Rule
CL/SuperSession KLVINNAM member must be configured in accordance with security requirements.
Medium Severity
CL/SuperSession configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications and compromise the confidentiality of customer data.
SRG-OS-000018
1 Rule
CL/SuperSession APPCLASS member is not configured in accordance with the proper security requirements.
Medium Severity
Product configuration/parameters control the security and operational characteristics of products. If these parameter values are improperly specified, security and operational controls may be weakened. This exposure may threaten the availability of the product applications, and compromise the confidentiality of customer data.