III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS JESNEWS resources must be protected in accordance with security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS JESTRACE and/or SYSLOG resources must be protected in accordance with security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS JES2 spool resources must be controlled in accordance with security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS JES2 system commands must be protected in accordance with security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
IBM z/OS surrogate users must be controlled in accordance with proper security requirements.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
IBM z/OS RJE workstations and NJE nodes must be controlled in accordance with security requirements.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
<GroupDescription></GroupDescription>Group -
IBM z/OS must configure system wait times to protect resource availability based on site priorities.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The IBM z/OS BPX.SMF resource must be properly configured.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
IBM z/OS SMF recording options for the TN3270 Telnet Server must be properly specified.
<VulnDiscussion>The TN3270 Telnet Server can provide audit data in the form of SMF records. The SMF data produced provides information about ...Rule Medium Severity -
SRG-OS-000001-GPOS-00001
<GroupDescription></GroupDescription>Group -
IBM RACF must be installed and active on the system.
<VulnDiscussion>Enterprise environments make account management for operating systems challenging and complex. A manual process for account m...Rule High Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
The IBM z/OS System Administrator (SA) must develop a process to disable emergency accounts after the crisis is resolved or 72 hours.
<VulnDiscussion>Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid acc...Rule Medium Severity -
SRG-OS-000274-GPOS-00104
<GroupDescription></GroupDescription>Group -
The IBM z/OS System Administrator (SA) must develop a process to notify appropriate personnel when accounts are created.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000275-GPOS-00105
<GroupDescription></GroupDescription>Group -
The IBM z/OS System Administrator (SA) must develop a process to notify appropriate personnel when accounts are modified.
<VulnDiscussion>Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and mani...Rule Medium Severity -
SRG-OS-000276-GPOS-00106
<GroupDescription></GroupDescription>Group -
The IBM z/OS System Administrator (SA) must develop a process to notify appropriate personnel when accounts are deleted.
<VulnDiscussion>Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and mani...Rule Medium Severity -
SRG-OS-000277-GPOS-00107
<GroupDescription></GroupDescription>Group -
The IBM z/OS System Administrator (SA) must develop a process to notify appropriate personnel when accounts are removed.
<VulnDiscussion>When operating system accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual ...Rule Medium Severity -
SRG-OS-000304-GPOS-00121
<GroupDescription></GroupDescription>Group -
The IBM z/OS System Administrator (SA) must develop a process to notify Information System Security Officers (ISSOs) of account enabling actions.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
IBM z/OS required SMF data record types must be collected.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
IBM z/OS must employ a session manager to manage display of the Standard Mandatory DoD Notice and Consent Banner.
<VulnDiscussion>Display of a standardized and approved use notification before granting access to the operating system ensures privacy and se...Rule Medium Severity -
SRG-OS-000038-GPOS-00016
<GroupDescription></GroupDescription>Group -
IBM z/OS must specify SMF data options to assure appropriate activation.
<VulnDiscussion>SMF data collection is the basic unit of tracking of all system functions and actions. Included in this tracking data are the...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
IBM z/OS SMF collection files (system MANx datasets or LOGSTREAM DASD) must have storage capacity to store at least one weeks worth of audit data.
<VulnDiscussion>In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems n...Rule Medium Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrators must develop an automated process to collect and retain SMF data.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000343-GPOS-00134
<GroupDescription></GroupDescription>Group -
IBM z/OS BUFUSEWARN in the SMFPRMxx must be properly set.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
IBM z/OS NOBUFFS in SMFPRMxx must be properly set (default is MSG).
<VulnDiscussion>It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The IBM z/OS SNTP daemon (SNTPD) must be active.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
IBM z/OS SNTP daemon (SNTPD) permission bits must be properly configured.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.