IBM z/OS ACF2 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000228-GPOS-00088
<GroupDescription></GroupDescription>Group -
IBM z/OS SSH daemon must be configured with the Department of Defense (DoD) logon banner.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the publicly accessible operating system en...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
<GroupDescription></GroupDescription>Group -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
IBM z/OS SSH daemon must be configured to only use the SSHv2 protocol.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule High Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
IBM z/OS SSH daemon must be configured to use a FIPS 140-2 compliant cryptographic algorithm.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS permission bits and user audit bits for HFS objects that are part of the Syslog daemon component must be configured properly.
<VulnDiscussion>HFS directories and files of the Syslog daemon provide the configuration and executable properties of this product. Failure t...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
IBM z/OS Syslog daemon must be started at z/OS initialization.
<VulnDiscussion>To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
IBM z/OS UNIX MVS HFS directory(s) with other write permission bit set must be properly defined.
<VulnDiscussion>Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforceme...Rule Medium Severity -
IBM z/OS Syslog daemon must be properly defined and secured.
<VulnDiscussion>The Syslog daemon, known as syslogd, is a zOS UNIX daemon that provides a central processing point for log messages issued by...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS DFSMS resource class(es) must be defined to the GSO CLASMAP record in accordance with security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS DFSMS Program Resources must be properly defined and protected.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS DFSMS control data sets must be protected in accordance with security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.