II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000001-GPOS-00001
Group -
The IBM z/VM TCP/IP DTCPARMS files must be properly configured to connect to an external security manager.
A comprehensive account management process such as provided by External Security Managers (ESM) which includes automation helps to ensure accounts designated as requiring attention are consistently...Rule High Severity -
SRG-OS-000004-GPOS-00004
Group -
CA VM:Secure product must be installed and operating.
A comprehensive account management process such as provided by an External Security Manager (ESM) which includes automation helps to ensure accounts designated as requiring attention are consistent...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The IBM z/VM JOURNALING LOGON parameter must be set for lockout after 3 attempts for 15 minutes.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The CA VM:Secure JOURNAL Facility parameters must be set for lockout after 3 attempts.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
The IBM z/VM LOGO Configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system.
Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbiage used is consistent with applicable federal ...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
The IBM z/VM TCP/IP FTP Server must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system and until users acknowledge the usage conditions and take explicit actions to log on for further access.
The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for acc...Rule Medium Severity -
SRG-OS-000024-GPOS-00007
Group -
The IBM z/VM LOGO configuration file must be configured to display the Standard Mandatory DoD Notice and Consent Banner until users acknowledge the usage conditions and take explicit actions to log on for further access.
The banner must be acknowledged by the user prior to allowing the user access to the operating system. This provides assurance that the user has seen the message and accepted the conditions for acc...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
Group -
For FTP processing Z/VM TCP/IP FTP server Exit must be enabled.
Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
The IBM z/VM TCP/IP configuration must include an SSLSERVERID statement.
The Secure Socket Layer (SSL) server, provides processing support for secure (encrypted) communication between remote clients and z/VM TCP/IP application servers that are configured for secure comm...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
CA VM:Secure product AUDIT file must be restricted to authorized personnel.
Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
Group -
The IBM z/VM Journal option must be specified in the Product Configuration File.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
All digital certificates in use must have a valid path to a trusted Certification authority.
Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted. A trust anchor is an authoritative entit...Rule Medium Severity -
SRG-OS-000067-GPOS-00035
Group -
The IBM z/VM TCP/IP Key database for LDAP or SSL server must be created with the proper permissions.
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
CA VM:Secure product Password Encryption (PEF) option must be properly configured to store and transmit cryptographically-protected passwords.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule High Severity -
SRG-OS-000076-GPOS-00044
Group -
CA VM:Secure product AUTOEXP record in the Security Config File must be properly set.
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
Group -
CA VM:Secure product PASSWORD user exit must be coded with the PWLIST option properly set.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
Group -
IBM zVM CA VM:Secure product PASSWORD user exit must be in use.
The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
IBM z/VM must be configured to disable non-essential capabilities.
It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission objectives. These unnecessary capabilities or services are often overlooke...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
Group -
CA VM:Secure product Config Delay LOG option must be set to 0.
IBM z/VM 6.4.0 made changes to obscure whether a logon is invalid due to the user ID or due to the password. Both the logon prompting sequence and the message HCPLGA050E were changed. However, DELA...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
Group -
All IBM z/VM TCP/IP Ports must be restricted to ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
Group -
The IBM z/VM Security Manager must provide a procedure to disable userIDs after 35 days of inactivity.
Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
The IBM z/VM TCP/IP VMSSL command operands must be configured properly.
VMSSL services are initiated using the VMSSL command defined in the DTCPARMS file. Unapproved mechanisms that are used for authentication to the cryptographic module are not verified and therefore ...Rule High Severity -
SRG-OS-000121-GPOS-00062
Group -
The IBM z/VM TCP/IP ANONYMOU statement must not be coded in FTP configuration.
Operating systems utilizing encryption are required to use FIPS-compliant mechanisms for authenticating to cryptographic modules.Rule Medium Severity -
SRG-OS-000132-GPOS-00067
Group -
CA VM:Secure product ADMIN GLOBALS command must be restricted to systems programming personnel.
Operating system management functionality includes functions necessary for administration and requires privileged user access. Allowing non-privileged users to access operating system management fu...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.