III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000342-GPOS-00133
Group -
CA VM:Secure product audit records must offload audit records to a different system or media.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000479-GPOS-00224
Group -
CA VM:Secure product audit records must be offloaded on a weekly basis.
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.Rule Medium Severity -
SRG-OS-000379-GPOS-00164
Group -
The IBM z/VM Portmapper server virtual machine userID must be included in the AUTOLOG statement of the TCP/IP server configuration file.
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the...Rule Medium Severity -
SRG-OS-000312-GPOS-00124
Group -
CA VM:Secure product MANAGE command must be restricted to system administrators.
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...Rule Medium Severity -
SRG-OS-000326-GPOS-00126
Group -
The CA VM:Secure LOGONBY command must be restricted to system administrators.
In certain situations, software applications/programs need to execute with elevated privileges to perform required functions. However, if the privileges required for execution are at a higher level...Rule Medium Severity -
SRG-OS-000324-GPOS-00125
Group -
The IBM z/VM CP Privilege Class A, B, and D must be restricted to appropriate system operators.
Preventing non-privileged users from executing privileged functions mitigates the risk that unauthorized individuals or processes may gain unnecessary access to information or privileges. Privileg...Rule Medium Severity -
SRG-OS-000329-GPOS-00128
Group -
The IBM z/VM JOURNALING statement must be properly configured.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the a...Rule Medium Severity -
SRG-OS-000425-GPOS-00189
Group -
The IBM z/VM TCP/IP SECUREDATA option for FTP must be set to REQUIRED.
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during pa...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
Group -
IBM z/VM TCP/IP config file INTERNALCLIENTPARMS statement must be properly configured.
Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access manage...Rule Medium Severity -
SRG-OS-000425-GPOS-00189
Group -
All IBM z/VM TCP/IP servers must be configured for SSL/TLS connection.
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission, for example, during aggregation, at protocol transformation points, and during pa...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.