III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000370-GPOS-00155
<GroupDescription></GroupDescription>Group -
IBM RACF must define UACC of NONE on all profiles.
<VulnDiscussion>The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software program...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
IBM z/OS PASSWORD data set and OS passwords must not be used.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
<GroupDescription></GroupDescription>Group -
The IBM z/OS Policy Agent must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
<VulnDiscussion>Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It al...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
Unsupported system software must not be installed and/ or active on the system.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
IBM z/OS must not allow nonexistent or inaccessible LINKLIST libraries.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
IBM z/OS must not allow nonexistent or inaccessible Link Pack Area (LPA) libraries.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM z/OS must not have inaccessible APF libraries defined.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM zOS inapplicable PPT entries must be invalidated.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM z/OS LNKAUTH=APFTAB must be specified in the IEASYSxx member(s) in the currently active parmlib data set(s).
<VulnDiscussion>Failure to specify LINKAUTH=APFTAB allows libraries other than those designated as APF to contain authorized modules which co...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
IBM z/OS must not have duplicated sensitive utilities and/or programs existing in APF libraries.
<VulnDiscussion>Removal of unneeded or non-secure functions, ports, protocols, and services mitigate the risk of unauthorized connection of d...Rule Low Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
The IBM z/OS systems requiring data-at-rest protection must properly employ IBM DS8880 or equivalent hardware solutions for full disk encryption.
<VulnDiscussion>This control addresses the confidentiality and integrity of information at rest and covers user information and system inform...Rule High Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
The IBM z/OS Policy Agent must contain a policy that protects against or limits the effects of denial-of-service (DoS) attacks by ensuring the operating system is implementing rate-limiting measures on impacted network interfaces.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-OS-000142-GPOS-00071
<GroupDescription></GroupDescription>Group -
The IBM z/OS Policy Agent must contain a policy that manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
<GroupDescription></GroupDescription>Group -
The IBM z/OS must employ a session manager that conceals, via the session lock, information previously visible on the display with a publicly viewable image.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
IBM z/OS must employ a session manager to manage session lock after a 15-minute period of inactivity.
<VulnDiscussion>A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...Rule Medium Severity -
SRG-OS-000030-GPOS-00011
<GroupDescription></GroupDescription>Group -
IBM z/OS must employ a session for users to directly initiate a session lock for all connection types.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
IBM z/OS must employ a session manager to manage retaining a users session lock until that user reestablishes access using established identification and authentication procedures.
<VulnDiscussion>A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrator must develop a procedure to remove or disable temporary user accounts after 72 hours.
<VulnDiscussion>Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid acc...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrator must develop a procedure to remove or disable emergency accounts after the crisis is resolved or 72 hours.
<VulnDiscussion>IBM z/OS system administrator must develop a procedure to remove or disable emergency accounts after the crisis is resolved o...Rule Medium Severity -
SRG-OS-000363-GPOS-00150
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrator must develop a procedure to notify designated personnel if baseline configurations are changed in an unauthorized manner.
<VulnDiscussion>Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...Rule Medium Severity -
SRG-OS-000122-GPOS-00063
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrator must develop a procedure to provide an audit reduction capability that supports on-demand reporting requirements.
<VulnDiscussion>The ability to generate on-demand reports, including after the audit data has been subjected to audit reduction, greatly faci...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrator must develop a procedure to remove all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000447-GPOS-00201
<GroupDescription></GroupDescription>Group -
IBM z/OS must shut down the information system, restart the information system, and/or notify the system administrator when anomalies in the operation of any security functions are discovered.
<VulnDiscussion>If anomalies are not acted upon, security functions may fail to secure the system. Security function is defined as the hard...Rule Medium Severity -
SRG-OS-000479-GPOS-00224
<GroupDescription></GroupDescription>Group -
IBM z/OS system administrator must develop a procedure to offload SMF files to a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
IBM z/OS SMF recording options for the SSH daemon must be configured to write SMF records for all eligible events.
<VulnDiscussion>SMF data collection is the basic unit of tracking of all system functions and actions. Included in this tracking data are the...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.