Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must employ a session manager to manage session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000030-GPOS-00011

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must employ a session for users to directly initiate a session lock for all connection types.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must employ a session manager to manage retaining a users session lock until that user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000002-GPOS-00002

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to remove or disable temporary user accounts after 72 hours.

    &lt;VulnDiscussion&gt;Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid acc...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to remove or disable emergency accounts after the crisis is resolved or 72 hours.

    &lt;VulnDiscussion&gt;IBM z/OS system administrator must develop a procedure to remove or disable emergency accounts after the crisis is resolved o...
    Rule Medium Severity
  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to notify designated personnel if baseline configurations are changed in an unauthorized manner.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000122-GPOS-00063

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to provide an audit reduction capability that supports on-demand reporting requirements.

    &lt;VulnDiscussion&gt;The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...
    Rule Medium Severity
  • SRG-OS-000126-GPOS-00066

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to terminate all sessions and network connections related to nonlocal maintenance when nonlocal maintenance is completed.

    &lt;VulnDiscussion&gt;If a maintenance session or connection remains open after maintenance is completed, it may be hijacked by an attacker and use...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to remove all software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-OS-000447-GPOS-00201

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS must shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.

    &lt;VulnDiscussion&gt;If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules