Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
IBM z/OS ACF2 Security Technical Implementation Guide
SRG-OS-000080-GPOS-00048
IBM z/OS UNIX MVS HFS directory(s) with other write permission bit set must be properly defined.
IBM z/OS UNIX MVS HFS directory(s) with other write permission bit set must be properly defined.
An XCCDF Rule
Details
Profiles
Prose
IBM z/OS UNIX MVS HFS directory(s) with other write permission bit set must be properly defined.
Medium Severity
<VulnDiscussion>Access control policies include: identity-based policies, role-based policies, and attribute-based policies. Access enforcement mechanisms include: access control lists, access control matrices, and cryptography. These policies and mechanisms must be employed by the application to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, and domains) in the information system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>