Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000426-GPOS-00190

    Group
  • The IBM z/VM TCP/IP SECURETELNETCLIENT option for telnet must be set to YES.

    Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during pa...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The IBM z/VM Privilege Classes C and E must be restricted to appropriate system administrators.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The IBM z/VM Privilege Class F must be restricted to service representatives and system administrators only.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...
    Rule Medium Severity
  • SRG-OS-000324-GPOS-00125

    Group
  • The IBM z/VM ANY Privilege Class must not be listed for privilege commands.

    Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • CA VM:Secure product VMXRPI configuration file must be restricted to authorized personnel.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • CA VM:Secure product DASD CONFIG file must be restricted to appropriate personnel.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • CA VM:Secure product AUTHORIZ CONFIG file must be restricted to appropriate personnel.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • CA VM:Secure product CONFIG file must be restricted to appropriate personnel.

    Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system....
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • CA VM:Secure Product SFS configuration file must be restricted to appropriate personnel.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • CA VM:Secure product Rules Facility must be restricted to appropriate personnel.

    Configuring the operating system to implement organization-wide security implementation guides and security checklists ensures compliance with federal standards and establishes a common security ba...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM z/VM must employ a Session manager.

    A session manager controls the semi-permanent interactive information interchange, also known as a dialogue, between a user and z/VM. Without the use of a session manager these semi-permanent inter...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM System administrator must develop a notification routine for account management.

    Information system accounts are utilized for identifying individual users or for identifying the operating system processes themselves. In order to detect and respond to events affecting user acces...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM system administrator must develop routines and processes for the proper configuration and maintenance of Software.

    Proper configuration management procedures for information systems provide for the proper configuration and maintenance in accordance with local policies restrictions and/or rules. Failure to prope...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM z/VM must be protected by an external firewall that has a deny-all, allow-by-exception policy.

    Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Firewalls provide monitoring and control of communications at the external boundary of an info...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM System administrator must develop routines and processes for notification in the event of audit failure.

    Audit processing failures include, for example, software/hardware errors, failures in the audit capturing mechanisms, and audit storage capacity being reached or exceeded. Without proper notificati...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM system administrator must develop procedures maintaining information system operation in the event of anomalies.

    If anomalies are not acted upon, security functions may fail to secure the system.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM z/VM system administrator must develop procedures to manually control temporary, interactive, and emergency accounts.

    Proper handling of temporary, inactive, and emergency accounts require automatic notification and action rather than at the convenience of the systems administrator. However in the absence of autom...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM z/VM must have access to an audit reduction tool that allows for central data review and analysis.

    Audit reduction is a process that manipulates collected audit information and organizes such information in a summary format that is more meaningful to analysts. Audit reduction and report generati...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM system administrator must develop and perform a procedure to validate the correct operation of security functions.

    Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed. Security function is defined as the hardware, software, and/or firmwar...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • IBM z/VM must employ Clock synchronization software.

    Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when condu...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM systems requiring data at rest must employ IBMs DS8000 for full disk encryption.

    Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest. Selection ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM TCP/IP NSLOOKUP statement for UFT servers must be properly configured.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM TCP/IP DOMAINLOOKUP statement must be properly configured.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM TCP/IP NSINTERADDR statement must be present in the TCPIP DATA configuration.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The IBM z/VM CHECKSUM statement must be included in the TCP/IP configuration file.

    If data origin authentication and data integrity verification are not performed, the resultant response could be forged, it may have come from a poisoned cache, the packets could have been intercep...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules