Skip to content

Control options for the Top Secret CICS facilities must meet minimum requirements.

An XCCDF Rule

Description

<VulnDiscussion>TSS CICS facilities define the security controls in effect for CICS regions. Failure to code the appropriate values could result in degraded security. This exposure may result in unauthorized access impacting the confidentiality, integrity, and availability of the CICS region, applications, and customer data.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-224737r868639_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Review the TSS control option values for all CICS facilities.
Ensure the following items are in effect for each CICS region's facility: 

1) The TSS CICS facility is defined with the control option values specified in table - "TOP SECRET INITIALIZATION PARAMETERS FOR CICS REGION" , in the zOS STIG Addendum. Note: An exception is MRO CICS regions in production will use SIGN(M) appropriately. 
2) XUSER=YES must be coded in each CICS facility. 
3) CICS transactions defined in the BYPASS list are not sensitive transactions.