IBM zVM Using CA VM:Secure Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000142-GPOS-00071
Group -
SRG-OS-000185-GPOS-00079
Group -
IBM z/VM tapes must use Tape Encryption.
Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used for backups) within an operating system. Guest o...Rule Medium Severity -
SRG-OS-000228-GPOS-00088
Group -
SRG-OS-000254-GPOS-00095
Group -
The IBM z/VM JOURNALING statement must be coded on the configuration file.
If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enab...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
CA VM:Secure product SECURITY CONFIG file must be restricted to appropriate personnel.
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000257-GPOS-00098
Group -
SRG-OS-000123-GPOS-00064
Group -
IBM z/VM must remove or disable emergency accounts after the crisis is resolved or 72 hours.
Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation may...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The IBM z/VM must restrict link access to the disk on which system software resides.
If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...Rule Medium Severity -
SRG-OS-000362-GPOS-00149
Group -
SRG-OS-000364-GPOS-00151
Group -
SRG-OS-000341-GPOS-00132
Group -
The IBM z/VM journal minidisk space allocation must be large enough for one weeks worth of audit records.
In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity. The task of a...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
Group -
CA VM:Secure product audit records must offload audit records to a different system or media.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000479-GPOS-00224
Group -
CA VM:Secure product audit records must be offloaded on a weekly basis.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000379-GPOS-00164
Group -
SRG-OS-000312-GPOS-00124
Group -
SRG-OS-000326-GPOS-00126
Group -
The CA VM:Secure LOGONBY command must be restricted to system administrators.
In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators.
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...Rule Medium Severity -
SRG-OS-000329-GPOS-00128
Group -
The IBM z/VM JOURNALING statement must be properly configured.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the a...Rule Medium Severity -
SRG-OS-000425-GPOS-00189
Group -
SRG-OS-000297-GPOS-00115
Group -
SRG-OS-000425-GPOS-00189
Group -
All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection.
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during pa...Rule Medium Severity -
SRG-OS-000426-GPOS-00190
Group -
SRG-OS-000324-GPOS-00125
Group -
The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators.
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000324-GPOS-00125
Group -
The IBM z/VM ANY Privilege Class must not be listed for privilege commands.
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel.
Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel.
Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
CA VM:Secure product Rules Facility must be restricted to appropriate personnel.
Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
IBM z/VM must employ a Session manager.
A session manager controls the semi-permanent interactive information interchange, also known as a dialogue, between a user and z/VM. Without the use of a session manager these semi-permanent inter...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.