Skip to content

IBM z/OS ACF2 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS NOBUFFS in SMFPRMxx must be properly set (Default is MSG).

    &lt;VulnDiscussion&gt;It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS SNTP daemon (SNTPD) permission bits must be properly configured.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS SNTP daemon (SNTPD) must be active.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000356-GPOS-00144

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS PARMLIB CLOCKxx must have the Accuracy PARM coded properly.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS SMF collection files (i.e., SYS1.MANx) access must be limited to appropriate users and/or batch jobs that perform SMF dump processing.

    &lt;VulnDiscussion&gt;SMF data collection is the system activity journaling facility of the z/OS system. Unauthorized access could result in the co...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS PASSWORD data set and OS passwords must not be used.

    &lt;VulnDiscussion&gt;Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must configure system waittimes to protect resource availability based on site priorities.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS Emergency LOGONIDs must be properly defined.

    &lt;VulnDiscussion&gt;Activity under unusual conditions can indicate hostile activity. For example, what is normal activity during business hours c...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS DFSMS control data sets must reside on separate storage volumes.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the sys...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS Policy Agent must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.

    &lt;VulnDiscussion&gt;Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It al...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Unsupported IBM z/OS system software must not be installed and/or active on the system.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule High Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must not allow non-existent or inaccessible LINKLIST libraries.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must not allow non-existent or inaccessible Link Pack Area (LPA) libraries.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must not have inaccessible APF libraries defined.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS LNKAUTH=APFTAB must be specified in the IEASYSxx member(s) in the currently active parmlib data set(s).

    &lt;VulnDiscussion&gt;Failure to specify LINKAUTH=APFTAB allows libraries other than those designated as APF to contain authorized modules which co...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • Duplicated IBM z/OS sensitive utilities and/or programs must not exist in APF libraries.

    &lt;VulnDiscussion&gt;Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of d...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must properly configure CONSOLxx members.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must use ICSF or SAF Key Rings for key management.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule Medium Severity
  • SRG-OS-000185-GPOS-00079

    <GroupDescription></GroupDescription>
    Group
  • The IBM z/OS systems requiring data at rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.

    &lt;VulnDiscussion&gt;Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS sensitive and critical system data sets must not exist on shared DASD.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS Policy agent must contain a policy that protects against or limits the effects of Denial of Service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000142-GPOS-00071

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS Policy agent must contain a policy that manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must employ a session manager to manage retaining a users session lock until that user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to notify designated personnel if baseline configurations are changed in an unauthorized manner.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000031-GPOS-00012

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must employ a session manager that conceal, via the session lock, information previously visible on the display with a publicly viewable image.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules