Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000259

    Group
  • CICS system data sets are not properly protected.

    CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. Unauthorized access to CICS system data sets (i.e., product, security, an...
    Rule Medium Severity
  • SRG-OS-000080

    Group
  • Sensitive CICS transactions are not protected in accordance with security requirements.

    Sensitive CICS transactions offer the ability to circumvent transaction level controls for accessing resources under CICS. These transactions must be protected so that only authorized users can ac...
    Rule Medium Severity
  • SRG-OS-000480

    Group
  • CICS System Initialization Table (SIT) parameter values must be specified in accordance with proper security requirements.

    The CICS SIT is used to define system operation and configuration parameters of a CICS system. Several of these parameters control the security within a CICS region. Failure to code the appropriate...
    Rule Medium Severity
  • SRG-OS-000104

    Group
  • CICS region logonid(s) must be defined and/or controlled in accordance with the security requirements.

    CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. Improperly defined or controlled CICS region userids may provide an expos...
    Rule Medium Severity
  • SRG-OS-000104

    Group
  • CICS default logonid(s) must be defined and/or controlled in accordance with the security requirements.

    CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. An improperly defined or controlled CICS default userid may provide an ex...
    Rule Medium Severity
  • SRG-OS-000029

    Group
  • CICS logonid(s) must have time-out limit set to 15 minutes.

    CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. Improperly defined or controlled CICS region userids may provide an expos...
    Rule Medium Severity
  • SRG-OS-000018

    Group
  • IBM CICS Transaction Server SPI command resources must be properly defined and protected.

    IBM CICS Transaction Server can run with sensitive system privileges, and potentially can circumvent system controls. Failure to properly control access to product resources could result in the com...
    Rule Medium Severity
  • SRG-OS-000080

    Group
  • External RACF Classes are not active for CICS transaction checking.

    Implement CICS transaction security by utilizing two distinct and unique RACF resource classes (i.e., member and grouping) within each CICS region. If several CICS regions are grouped in an MRO env...
    Rule Medium Severity
  • SRG-OS-000080

    Group
  • CICS regions are improperly protected to prevent unauthorized propagation of the region userid.

    CICS is a transaction-processing product that provides programmers with the facilities to develop interactive applications. Improperly defined or controlled CICS userids (i.e., region, default, and...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules