Skip to content

IBM z/OS TSS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The CA-TSS NPPTHRESH Control Option must be properly set.

    <VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The CA-TSS PTHRESH Control Option must be set to 2.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • The CA-TSS NPPTHRESH Control Option must be properly set.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must use NIST FIPS-validated cryptography to protect passwords in the security database.

    &lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...
    Rule High Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • The CA-TSS PWEXP Control Option must be set to 60.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • Expired IBM z/OS digital certificates must not be used.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must have Certificate Name Filtering implemented with appropriate authorization and documentation.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • CA-TSS Security control ACIDs must be limited to the administrative authorities authorized and that require these privileges to perform their job duties.

    &lt;VulnDiscussion&gt;The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A cru...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The number of CA-TSS ACIDs possessing the tape Bypass Label Processing (BLP) privilege must be limited.

    &lt;VulnDiscussion&gt;The use of security policy filters provides protection for the confidentiality of data by restricting the flow of data. A cru...
    Rule Medium Severity
  • SRG-OS-000001-GPOS-00001

    <GroupDescription></GroupDescription>
    Group
  • CA-TSS MODE Control Option must be set to FAIL.

    &lt;VulnDiscussion&gt;Enterprise environments make account management challenging and complex. A manual process for account management functions ad...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules