IBM z/OS ACF2 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The IBM z/OS BPX.SMF resource must be properly configured.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
IBM z/OS JES2 output devices must be properly controlled for Classified Systems.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS JES2 output devices must be controlled in accordance with the proper security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS JES2 input sources must be controlled in accordance with the proper security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS Surrogate users must be controlled in accordance with proper security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
IBM z/OS Inapplicable PPT entries must be invalidated.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000277-GPOS-00107
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are removed.
<VulnDiscussion>When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual...Rule Medium Severity -
SRG-OS-000275-GPOS-00105
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are modified.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000276-GPOS-00106
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are deleted.
<VulnDiscussion>When operating system accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual...Rule Medium Severity -
SRG-OS-000274-GPOS-00104
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrators must develop an automated process to collect and retain SMF data.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The IBM z/OS system administrator (SA) must develop a process notify appropriate personnel when accounts are created.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.