Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000002-GPOS-00002

    <GroupDescription></GroupDescription>
    Group
  • The IBM z/OS system administrator (SA) must develop a procedure to automatically remove or disable temporary user accounts after 72 hours.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-OS-000123-GPOS-00064

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.

    &lt;VulnDiscussion&gt;Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid acc...
    Rule Medium Severity
  • SRG-OS-000304-GPOS-00121

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to notify system administrators (SAs) and information system security officers (ISSOs) of account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to remove all software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-OS-000447-GPOS-00201

    <GroupDescription></GroupDescription>
    Group
  • IBM z/OS system administrator must develop a procedure to shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.

    &lt;VulnDiscussion&gt;If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules